Vulnerabilities > Redlion > Crimson > 3.0
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-11-06 | CVE-2023-5719 | Unspecified vulnerability in Redlion Crimson The Crimson 3.2 Windows-based configuration tool allows users with administrative access to define new passwords for users and to download the resulting security configuration to a device. | 9.8 |
2022-11-17 | CVE-2022-3090 | Unspecified vulnerability in Redlion Crimson Red Lion Controls Crimson 3.0 versions 707.000 and prior, Crimson 3.1 versions 3126.001 and prior, and Crimson 3.2 versions 3.2.0044.0 and prior are vulnerable to path traversal. | 5.3 |
2019-09-23 | CVE-2019-10996 | Use After Free vulnerability in Redlion Crimson Red Lion Controls Crimson, version 3.0 and prior and version 3.1 prior to release 3112.00, allow multiple vulnerabilities to be exploited when a valid user opens a specially crafted, malicious input file that can reference memory after it has been freed. | 7.8 |
2019-09-23 | CVE-2019-10990 | Use of Hard-coded Credentials vulnerability in Redlion Crimson Red Lion Controls Crimson, version 3.0 and prior and version 3.1 prior to release 3112.00, uses a hard-coded password to encrypt protected files in transit and at rest, which may allow an attacker to access configuration files. | 6.5 |
2019-09-23 | CVE-2019-10984 | Unspecified vulnerability in Redlion Crimson Red Lion Controls Crimson, version 3.0 and prior and version 3.1 prior to release 3112.00, allow multiple vulnerabilities to be exploited when a valid user opens a specially crafted, malicious input file that causes the program to mishandle pointers. | 7.8 |
2019-09-23 | CVE-2019-10978 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Redlion Crimson Red Lion Controls Crimson, version 3.0 and prior and version 3.1 prior to release 3112.00, allow multiple vulnerabilities to be exploited when a valid user opens a specially crafted, malicious input file that operates outside of the designated memory area. | 7.8 |