Vulnerabilities > Redlion > Crimson > 3.2

DATE CVE VULNERABILITY TITLE RISK
2023-11-06 CVE-2023-5719 Unspecified vulnerability in Redlion Crimson
The Crimson 3.2 Windows-based configuration tool allows users with administrative access to define new passwords for users and to download the resulting security configuration to a device.
network
low complexity
redlion
critical
9.8
2022-11-17 CVE-2022-3090 Path Traversal vulnerability in Redlion Crimson
Red Lion Controls Crimson 3.0 versions 707.000 and prior, Crimson 3.1 versions 3126.001 and prior, and Crimson 3.2 versions 3.2.0044.0 and prior are vulnerable to path traversal.
network
low complexity
redlion CWE-22
5.3
2019-09-23 CVE-2019-10996 Use After Free vulnerability in Redlion Crimson
Red Lion Controls Crimson, version 3.0 and prior and version 3.1 prior to release 3112.00, allow multiple vulnerabilities to be exploited when a valid user opens a specially crafted, malicious input file that can reference memory after it has been freed.
local
low complexity
redlion CWE-416
7.8
2019-09-23 CVE-2019-10990 Use of Hard-coded Credentials vulnerability in Redlion Crimson
Red Lion Controls Crimson, version 3.0 and prior and version 3.1 prior to release 3112.00, uses a hard-coded password to encrypt protected files in transit and at rest, which may allow an attacker to access configuration files.
network
low complexity
redlion CWE-798
6.5
2019-09-23 CVE-2019-10984 Unspecified vulnerability in Redlion Crimson
Red Lion Controls Crimson, version 3.0 and prior and version 3.1 prior to release 3112.00, allow multiple vulnerabilities to be exploited when a valid user opens a specially crafted, malicious input file that causes the program to mishandle pointers.
local
low complexity
redlion
7.8
2019-09-23 CVE-2019-10978 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Redlion Crimson
Red Lion Controls Crimson, version 3.0 and prior and version 3.1 prior to release 3112.00, allow multiple vulnerabilities to be exploited when a valid user opens a specially crafted, malicious input file that operates outside of the designated memory area.
local
low complexity
redlion CWE-119
7.8