Redis

Redis

43 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.37%
  • Veröffentlicht 18.05.2023 20:15:09
  • Zuletzt bearbeitet 21.11.2024 08:02:08

redis v7.0.10 was discovered to contain a segmentation violation. This vulnerability allows attackers to cause a Denial of Service (DoS) via unspecified vectors.

  • EPSS 0.12%
  • Veröffentlicht 18.04.2023 21:15:09
  • Zuletzt bearbeitet 21.11.2024 07:56:10

Redis is an open source, in-memory database that persists on disk. Authenticated users can use the `HINCRBYFLOAT` command to create an invalid hash field that will crash Redis on access in affected versions. This issue has been addressed in in versio...

  • EPSS 45.08%
  • Veröffentlicht 20.03.2023 20:15:52
  • Zuletzt bearbeitet 21.11.2024 07:55:02

Redis is an in-memory database that persists on disk. Starting in version 7.0.8 and prior to version 7.0.10, authenticated users can use the MSETNX command to trigger a runtime assertion and termination of the Redis server process. The problem is fix...

  • EPSS 2.96%
  • Veröffentlicht 02.03.2023 04:15:10
  • Zuletzt bearbeitet 21.11.2024 07:49:12

Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted `SRANDMEMBER`, `ZRANDMEMBER`, and `HRANDFIELD` commands can trigger an integer overflow, resulting in a runtime assertion and termination of the Redis...

  • EPSS 59.4%
  • Veröffentlicht 01.03.2023 16:15:09
  • Zuletzt bearbeitet 21.11.2024 07:12:12

Redis is an in-memory database that persists on disk. Authenticated users can use string matching commands (like `SCAN` or `KEYS`) with a specially crafted pattern to trigger a denial-of-service attack on Redis, causing it to hang and consume 100% CP...

  • EPSS 66.7%
  • Veröffentlicht 20.01.2023 19:15:17
  • Zuletzt bearbeitet 21.11.2024 07:44:50

Redis is an in-memory database that persists on disk. Authenticated users can issue a `HRANDFIELD` or `ZRANDMEMBER` command with specially crafted arguments to trigger a denial-of-service by crashing Redis with an assertion failure. This problem affe...

  • EPSS 46.13%
  • Veröffentlicht 20.01.2023 19:15:14
  • Zuletzt bearbeitet 21.11.2024 07:12:05

Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted `SETRANGE` and `SORT(_RO)` commands can trigger an integer overflow, resulting with Redis attempting to allocate impossible amounts of memory and abor...

  • EPSS 0.15%
  • Veröffentlicht 28.10.2022 08:15:14
  • Zuletzt bearbeitet 21.11.2024 07:20:07

A vulnerability was found in a port or fork of Redis. It has been declared as critical. This vulnerability affects unknown code in the library C:/Program Files/Redis/dbghelp.dll. The manipulation leads to uncontrolled search path. The attack can be i...

Exploit
  • EPSS 0.13%
  • Veröffentlicht 21.10.2022 18:15:10
  • Zuletzt bearbeitet 21.11.2024 07:19:57

** DISPUTED ** A vulnerability, which was classified as problematic, was found in Redis up to 6.2.7/7.0.5. Affected is the function sigsegvHandler of the file debug.c of the component Crash Report. The manipulation leads to denial of service. The com...

  • EPSS 81.37%
  • Veröffentlicht 23.09.2022 04:15:11
  • Zuletzt bearbeitet 21.11.2024 07:12:02

Redis is an in-memory database that persists on disk. Versions 7.0.0 and above, prior to 7.0.5 are vulnerable to an Integer Overflow. Executing an `XAUTOCLAIM` command on a stream key in a specific state, with a specially crafted `COUNT` argument may...