Lucene search

K
RedlionCrimson

5 matches found

CVE
CVE
added 2019/09/23 4:15 p.m.61 views

CVE-2019-10996

Red Lion Controls Crimson, version 3.0 and prior and version 3.1 prior to release 3112.00, allow multiple vulnerabilities to be exploited when a valid user opens a specially crafted, malicious input file that can reference memory after it has been freed.

7.8CVSS7.7AI score0.00156EPSS
CVE
CVE
added 2019/09/23 4:15 p.m.56 views

CVE-2019-10984

Red Lion Controls Crimson, version 3.0 and prior and version 3.1 prior to release 3112.00, allow multiple vulnerabilities to be exploited when a valid user opens a specially crafted, malicious input file that causes the program to mishandle pointers.

7.8CVSS7.7AI score0.00155EPSS
CVE
CVE
added 2019/09/23 4:15 p.m.52 views

CVE-2019-10978

Red Lion Controls Crimson, version 3.0 and prior and version 3.1 prior to release 3112.00, allow multiple vulnerabilities to be exploited when a valid user opens a specially crafted, malicious input file that operates outside of the designated memory area.

7.8CVSS7.7AI score0.00156EPSS
CVE
CVE
added 2022/11/17 10:15 p.m.36 views

CVE-2022-3090

Red Lion Controls Crimson 3.0 versions 707.000 and prior, Crimson 3.1 versions 3126.001 and prior, and Crimson 3.2 versions 3.2.0044.0 and prior are vulnerable to path traversal. When attempting to open a file using a specific path, the user's password hash is sent to an arbitrary host. This could ...

7.5CVSS5.3AI score0.00094EPSS
CVE
CVE
added 2021/01/06 4:15 p.m.34 views

CVE-2020-27279

A NULL pointer deference vulnerability has been identified in the protocol converter. An attacker could send a specially crafted packet that could reboot the device running Crimson 3.1 (Build versions prior to 3119.001).

7.8CVSS7.3AI score0.0011EPSS