Vulnerabilities > Redlion
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-09-01 | CVE-2020-16206 | Unspecified vulnerability in Redlion N-Tron 702-W Firmware and N-Tron 702M12-W Firmware The affected product is vulnerable to stored cross-site scripting, which may allow an attacker to remotely execute arbitrary code to gain access to sensitive data on the N-Tron 702-W / 702M12-W (all versions). | 9.0 |
2020-09-01 | CVE-2020-16204 | Unspecified vulnerability in Redlion N-Tron 702-W Firmware and N-Tron 702M12-W Firmware The affected product is vulnerable due to an undocumented interface found on the device, which may allow an attacker to execute commands as root on the device on the N-Tron 702-W / 702M12-W (all versions). | 9.8 |
2019-09-23 | CVE-2019-10996 | Use After Free vulnerability in Redlion Crimson Red Lion Controls Crimson, version 3.0 and prior and version 3.1 prior to release 3112.00, allow multiple vulnerabilities to be exploited when a valid user opens a specially crafted, malicious input file that can reference memory after it has been freed. | 7.8 |
2019-09-23 | CVE-2019-10990 | Use of Hard-coded Credentials vulnerability in Redlion Crimson Red Lion Controls Crimson, version 3.0 and prior and version 3.1 prior to release 3112.00, uses a hard-coded password to encrypt protected files in transit and at rest, which may allow an attacker to access configuration files. | 6.5 |
2019-09-23 | CVE-2019-10984 | Unspecified vulnerability in Redlion Crimson Red Lion Controls Crimson, version 3.0 and prior and version 3.1 prior to release 3112.00, allow multiple vulnerabilities to be exploited when a valid user opens a specially crafted, malicious input file that causes the program to mishandle pointers. | 7.8 |
2019-09-23 | CVE-2019-10978 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Redlion Crimson Red Lion Controls Crimson, version 3.0 and prior and version 3.1 prior to release 3112.00, allow multiple vulnerabilities to be exploited when a valid user opens a specially crafted, malicious input file that operates outside of the designated memory area. | 7.8 |
2018-05-09 | CVE-2016-9335 | Use of Hard-coded Credentials vulnerability in Redlion products A hard-coded cryptographic key vulnerability was identified in Red Lion Controls Sixnet-Managed Industrial Switches running firmware Version 5.0.196 and Stride-Managed Ethernet Switches running firmware Version 5.0.190. | 10.0 |
2017-12-30 | CVE-2017-14855 | Unspecified vulnerability in Redlion HMI Panel Firmware 2.41 Red Lion HMI panels allow remote attackers to cause a denial of service (software exception) via an HTTP POST request to a long URI that does not exist, as demonstrated by version HMI 2.41 PLC 2.42. | 8.6 |
2017-11-20 | CVE-2017-16544 | Code Injection vulnerability in multiple products In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. | 8.8 |