CVE-2023-41053
- EPSS 0.82%
- Veröffentlicht 06.09.2023 21:15:14
- Zuletzt bearbeitet 21.11.2024 08:20:27
Redis is an in-memory database that persists on disk. Redis does not correctly identify keys accessed by `SORT_RO` and as a result may grant users executing this command access to keys that are not explicitly authorized by the ACL configuration. The ...
CVE-2021-31294
- EPSS 0.24%
- Veröffentlicht 15.07.2023 23:15:09
- Zuletzt bearbeitet 21.11.2024 06:05:24
Redis before 6cbea7d allows a replica to cause an assertion failure in a primary server by sending a non-administrative command (specifically, a SET command). NOTE: this was fixed for Redis 6.2.x and 7.x in 2021. Versions before 6.2 were not intended...
CVE-2022-24834
- EPSS 45.53%
- Veröffentlicht 13.07.2023 15:15:08
- Zuletzt bearbeitet 21.11.2024 06:51:12
Redis is an in-memory database that persists on disk. A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson library, and result with heap corruption and potentially remote code execution. The problem exists in all...
CVE-2023-36824
- EPSS 89%
- Veröffentlicht 11.07.2023 17:15:13
- Zuletzt bearbeitet 10.04.2025 20:54:22
Redis is an in-memory database that persists on disk. In Redit 7.0 prior to 7.0.12, extracting key names from a command and a list of arguments may, in some cases, trigger a heap overflow and result in reading random heap memory, heap corruption and ...
CVE-2023-31655
- EPSS 0.51%
- Veröffentlicht 18.05.2023 20:15:09
- Zuletzt bearbeitet 21.11.2024 08:02:08
redis v7.0.10 was discovered to contain a segmentation violation. This vulnerability allows attackers to cause a Denial of Service (DoS) via unspecified vectors.
CVE-2023-28856
- EPSS 0.33%
- Veröffentlicht 18.04.2023 21:15:09
- Zuletzt bearbeitet 21.11.2024 07:56:10
Redis is an open source, in-memory database that persists on disk. Authenticated users can use the `HINCRBYFLOAT` command to create an invalid hash field that will crash Redis on access in affected versions. This issue has been addressed in in versio...
CVE-2023-28425
- EPSS 45.29%
- Veröffentlicht 20.03.2023 20:15:52
- Zuletzt bearbeitet 21.11.2024 07:55:02
Redis is an in-memory database that persists on disk. Starting in version 7.0.8 and prior to version 7.0.10, authenticated users can use the MSETNX command to trigger a runtime assertion and termination of the Redis server process. The problem is fix...
CVE-2023-25155
- EPSS 5.04%
- Veröffentlicht 02.03.2023 04:15:10
- Zuletzt bearbeitet 21.11.2024 07:49:12
Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted `SRANDMEMBER`, `ZRANDMEMBER`, and `HRANDFIELD` commands can trigger an integer overflow, resulting in a runtime assertion and termination of the Redis...
CVE-2022-36021
- EPSS 60.65%
- Veröffentlicht 01.03.2023 16:15:09
- Zuletzt bearbeitet 21.11.2024 07:12:12
Redis is an in-memory database that persists on disk. Authenticated users can use string matching commands (like `SCAN` or `KEYS`) with a specially crafted pattern to trigger a denial-of-service attack on Redis, causing it to hang and consume 100% CP...
CVE-2023-22458
- EPSS 51.24%
- Veröffentlicht 20.01.2023 19:15:17
- Zuletzt bearbeitet 21.11.2024 07:44:50
Redis is an in-memory database that persists on disk. Authenticated users can issue a `HRANDFIELD` or `ZRANDMEMBER` command with specially crafted arguments to trigger a denial-of-service by crashing Redis with an assertion failure. This problem affe...