Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
lion vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2020-1880
Huawei smartphone Lion-AL00C with versions earlier than 10.0.0.205(C00E202R7P2) have a denial of service vulnerability. An attacker crafted specially file to the affected device. Due to insufficient input validation of the value when executing the file, successful exploit may cau...
Huawei Lion-al00c Firmware
5.4
CVSSv2
CVE-2014-5913
The Allies in War (aka com.gamelion.aiw) application 1.3.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle malicious users to spoof servers and obtain sensitive information via a crafted certificate.
Game-lion Allies In War 1.3.2
9.3
CVSSv2
CVE-2020-16208
The affected product is vulnerable to cross-site request forgery, which may allow an malicious user to modify different configurations of a device by luring an authenticated user to click on a crafted link on the N-Tron 702-W / 702M12-W (all versions).
Redlion N-tron 702-w Firmware
Redlion N-tron 702m12-w Firmware
10
CVSSv2
CVE-2020-16204
The affected product is vulnerable due to an undocumented interface found on the device, which may allow an malicious user to execute commands as root on the device on the N-Tron 702-W / 702M12-W (all versions).
Redlion N-tron 702-w Firmware
Redlion N-tron 702m12-w Firmware
3.5
CVSSv2
CVE-2020-16206
The affected product is vulnerable to stored cross-site scripting, which may allow an malicious user to remotely execute arbitrary code to gain access to sensitive data on the N-Tron 702-W / 702M12-W (all versions).
Redlion N-tron 702-w Firmware
Redlion N-tron 702m12-w Firmware
3.5
CVSSv2
CVE-2020-16210
The affected product is vulnerable to reflected cross-site scripting, which may allow an malicious user to remotely execute arbitrary code and perform actions in the context of an attacked user on the N-Tron 702-W / 702M12-W (all versions).
Redlion N-tron 702-w Firmware
Redlion N-tron 702m12-w Firmware
10
CVSSv2
CVE-2016-9335
A hard-coded cryptographic key vulnerability was identified in Red Lion Controls Sixnet-Managed Industrial Switches running firmware Version 5.0.196 and Stride-Managed Ethernet Switches running firmware Version 5.0.190. Vulnerable versions of Stride-Managed Ethernet switches and ...
Redlion Sixnet-managed Industrial Switches Firmware
Redlion Stride-managed Ethernet Switches Firmware
NA
CVE-2023-34412
A vulnerability in Red Lion Europe mbNET/mbNET.rokey and Helmholz REX 200 and REX 250 devices with firmware lower 7.3.2 allows an authenticated remote attacker with high privileges to inject malicious HTML or JavaScript code (XSS).
Helmholz Rex 250 Firmware
Helmholz Rex 200 Firmware
Redlion Mbnet.rokey Rkh 210 Firmware
Redlion Mbnet.rokey Rkh 216 Firmware
Redlion Mbnet.rokey Rkh 235 Firmware
Redlion Mbnet.rokey Rkh 259 Firmware
Redlion Mbnet Mdh 811 Firmware
Redlion Mbnet Mdh 850 Firmware
Redlion Mbnet Mdh 871 Firmware
Redlion Mbnet Mdh 831 Firmware
Redlion Mbnet Mdh 855 Firmware
Redlion Mbnet Mdh 876 Firmware
Redlion Mbnet Mdh 858 Firmware
Redlion Mbnet Mdh 816 Firmware
Redlion Mbnet Mdh 841 Firmware
Redlion Mbnet Mdh 859 Firmware
Redlion Mbnet Mdh 835 Firmware
7.8
CVSSv2
CVE-2017-14855
Red Lion HMI panels allow remote malicious users to cause a denial of service (software exception) via an HTTP POST request to a long URI that does not exist, as demonstrated by version HMI 2.41 PLC 2.42.
Redlion Hmi Panel Firmware 2.41
4.3
CVSSv2
CVE-2019-10990
Red Lion Controls Crimson, version 3.0 and prior and version 3.1 prior to release 3112.00, uses a hard-coded password to encrypt protected files in transit and at rest, which may allow an malicious user to access configuration files.
Redlion Crimson
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site scripting
CVE-2024-5158
XML external entity
CVE-2024-4262
CVE-2024-2036
CVE-2024-4985
CVE-2024-21791
remote attackers
CVE-2023-43208
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »