red hawk vulnerabilities