Show filters
22 Total Results
Displaying 11-20 of 22
Sort by:
Attacker Value
Unknown
CVE-2020-27285
Disclosure Date: January 06, 2021 (last updated February 22, 2025)
The default configuration of Crimson 3.1 (Build versions prior to 3119.001) allows a user to be able to read and modify the database without authentication.
0
Attacker Value
Unknown
CVE-2020-16204
Disclosure Date: September 01, 2020 (last updated February 22, 2025)
The affected product is vulnerable due to an undocumented interface found on the device, which may allow an attacker to execute commands as root on the device on the N-Tron 702-W / 702M12-W (all versions).
0
Attacker Value
Unknown
CVE-2020-16208
Disclosure Date: September 01, 2020 (last updated February 22, 2025)
The affected product is vulnerable to cross-site request forgery, which may allow an attacker to modify different configurations of a device by luring an authenticated user to click on a crafted link on the N-Tron 702-W / 702M12-W (all versions).
0
Attacker Value
Unknown
CVE-2020-16206
Disclosure Date: September 01, 2020 (last updated February 22, 2025)
The affected product is vulnerable to stored cross-site scripting, which may allow an attacker to remotely execute arbitrary code to gain access to sensitive data on the N-Tron 702-W / 702M12-W (all versions).
0
Attacker Value
Unknown
CVE-2020-16210
Disclosure Date: September 01, 2020 (last updated February 22, 2025)
The affected product is vulnerable to reflected cross-site scripting, which may allow an attacker to remotely execute arbitrary code and perform actions in the context of an attacked user on the N-Tron 702-W / 702M12-W (all versions).
0
Attacker Value
Unknown
CVE-2019-10978
Disclosure Date: September 23, 2019 (last updated November 27, 2024)
Red Lion Controls Crimson, version 3.0 and prior and version 3.1 prior to release 3112.00, allow multiple vulnerabilities to be exploited when a valid user opens a specially crafted, malicious input file that operates outside of the designated memory area.
0
Attacker Value
Unknown
CVE-2019-10990
Disclosure Date: September 23, 2019 (last updated November 27, 2024)
Red Lion Controls Crimson, version 3.0 and prior and version 3.1 prior to release 3112.00, uses a hard-coded password to encrypt protected files in transit and at rest, which may allow an attacker to access configuration files.
0
Attacker Value
Unknown
CVE-2019-10984
Disclosure Date: September 23, 2019 (last updated November 27, 2024)
Red Lion Controls Crimson, version 3.0 and prior and version 3.1 prior to release 3112.00, allow multiple vulnerabilities to be exploited when a valid user opens a specially crafted, malicious input file that causes the program to mishandle pointers.
0
Attacker Value
Unknown
CVE-2019-10996
Disclosure Date: September 23, 2019 (last updated November 27, 2024)
Red Lion Controls Crimson, version 3.0 and prior and version 3.1 prior to release 3112.00, allow multiple vulnerabilities to be exploited when a valid user opens a specially crafted, malicious input file that can reference memory after it has been freed.
0
Attacker Value
Unknown
CVE-2016-9335
Disclosure Date: May 09, 2018 (last updated November 26, 2024)
A hard-coded cryptographic key vulnerability was identified in Red Lion Controls Sixnet-Managed Industrial Switches running firmware Version 5.0.196 and Stride-Managed Ethernet Switches running firmware Version 5.0.190. Vulnerable versions of Stride-Managed Ethernet switches and Sixnet-Managed Industrial switches use hard-coded HTTP SSL/SSH keys for secure communication. Because these keys cannot be regenerated by users, all products use the same key. The attacker could disrupt communication or compromise the system. CVSS v3 base score: 10, CVSS vector string: (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). Red Lion Controls recommends updating to SLX firmware Version 5.3.174.
0