CVE-2023-5719
- EPSS 0.09%
- Veröffentlicht 06.11.2023 20:15:07
- Zuletzt bearbeitet 21.11.2024 08:42:21
The Crimson 3.2 Windows-based configuration tool allows users with administrative access to define new passwords for users and to download the resulting security configuration to a device. If such a password contains the percent (%) character, inval...
CVE-2022-3090
- EPSS 0.13%
- Veröffentlicht 17.11.2022 22:15:10
- Zuletzt bearbeitet 21.11.2024 07:18:48
Red Lion Controls Crimson 3.0 versions 707.000 and prior, Crimson 3.1 versions 3126.001 and prior, and Crimson 3.2 versions 3.2.0044.0 and prior are vulnerable to path traversal. When attempting to open a file using a specific path, the user's passwo...
CVE-2020-27279
- EPSS 0.11%
- Veröffentlicht 06.01.2021 16:15:12
- Zuletzt bearbeitet 21.11.2024 05:20:59
A NULL pointer deference vulnerability has been identified in the protocol converter. An attacker could send a specially crafted packet that could reboot the device running Crimson 3.1 (Build versions prior to 3119.001).
CVE-2020-27283
- EPSS 0.18%
- Veröffentlicht 06.01.2021 16:15:12
- Zuletzt bearbeitet 21.11.2024 05:20:59
An attacker could send a specially crafted message to Crimson 3.1 (Build versions prior to 3119.001) that could leak arbitrary memory locations.
CVE-2020-27285
- EPSS 0.19%
- Veröffentlicht 06.01.2021 15:15:14
- Zuletzt bearbeitet 21.11.2024 05:20:59
The default configuration of Crimson 3.1 (Build versions prior to 3119.001) allows a user to be able to read and modify the database without authentication.
CVE-2019-10978
- EPSS 0.16%
- Veröffentlicht 23.09.2019 16:15:14
- Zuletzt bearbeitet 21.11.2024 04:20:17
Red Lion Controls Crimson, version 3.0 and prior and version 3.1 prior to release 3112.00, allow multiple vulnerabilities to be exploited when a valid user opens a specially crafted, malicious input file that operates outside of the designated memory...
CVE-2019-10984
- EPSS 0.16%
- Veröffentlicht 23.09.2019 16:15:14
- Zuletzt bearbeitet 21.11.2024 04:20:17
Red Lion Controls Crimson, version 3.0 and prior and version 3.1 prior to release 3112.00, allow multiple vulnerabilities to be exploited when a valid user opens a specially crafted, malicious input file that causes the program to mishandle pointers.
CVE-2019-10990
- EPSS 0.21%
- Veröffentlicht 23.09.2019 16:15:14
- Zuletzt bearbeitet 21.11.2024 04:20:18
Red Lion Controls Crimson, version 3.0 and prior and version 3.1 prior to release 3112.00, uses a hard-coded password to encrypt protected files in transit and at rest, which may allow an attacker to access configuration files.
CVE-2019-10996
- EPSS 0.16%
- Veröffentlicht 23.09.2019 16:15:14
- Zuletzt bearbeitet 21.11.2024 04:20:19
Red Lion Controls Crimson, version 3.0 and prior and version 3.1 prior to release 3112.00, allow multiple vulnerabilities to be exploited when a valid user opens a specially crafted, malicious input file that can reference memory after it has been fr...