CVE-2023-31655
- EPSS 0.37%
- Veröffentlicht 18.05.2023 20:15:09
- Zuletzt bearbeitet 21.11.2024 08:02:08
redis v7.0.10 was discovered to contain a segmentation violation. This vulnerability allows attackers to cause a Denial of Service (DoS) via unspecified vectors.
CVE-2023-28856
- EPSS 0.12%
- Veröffentlicht 18.04.2023 21:15:09
- Zuletzt bearbeitet 21.11.2024 07:56:10
Redis is an open source, in-memory database that persists on disk. Authenticated users can use the `HINCRBYFLOAT` command to create an invalid hash field that will crash Redis on access in affected versions. This issue has been addressed in in versio...
CVE-2023-28425
- EPSS 45.08%
- Veröffentlicht 20.03.2023 20:15:52
- Zuletzt bearbeitet 21.11.2024 07:55:02
Redis is an in-memory database that persists on disk. Starting in version 7.0.8 and prior to version 7.0.10, authenticated users can use the MSETNX command to trigger a runtime assertion and termination of the Redis server process. The problem is fix...
CVE-2023-25155
- EPSS 2.96%
- Veröffentlicht 02.03.2023 04:15:10
- Zuletzt bearbeitet 21.11.2024 07:49:12
Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted `SRANDMEMBER`, `ZRANDMEMBER`, and `HRANDFIELD` commands can trigger an integer overflow, resulting in a runtime assertion and termination of the Redis...
CVE-2022-36021
- EPSS 59.4%
- Veröffentlicht 01.03.2023 16:15:09
- Zuletzt bearbeitet 21.11.2024 07:12:12
Redis is an in-memory database that persists on disk. Authenticated users can use string matching commands (like `SCAN` or `KEYS`) with a specially crafted pattern to trigger a denial-of-service attack on Redis, causing it to hang and consume 100% CP...
CVE-2023-22458
- EPSS 66.7%
- Veröffentlicht 20.01.2023 19:15:17
- Zuletzt bearbeitet 21.11.2024 07:44:50
Redis is an in-memory database that persists on disk. Authenticated users can issue a `HRANDFIELD` or `ZRANDMEMBER` command with specially crafted arguments to trigger a denial-of-service by crashing Redis with an assertion failure. This problem affe...
CVE-2022-35977
- EPSS 46.13%
- Veröffentlicht 20.01.2023 19:15:14
- Zuletzt bearbeitet 21.11.2024 07:12:05
Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted `SETRANGE` and `SORT(_RO)` commands can trigger an integer overflow, resulting with Redis attempting to allocate impossible amounts of memory and abor...
CVE-2022-3734
- EPSS 0.15%
- Veröffentlicht 28.10.2022 08:15:14
- Zuletzt bearbeitet 21.11.2024 07:20:07
A vulnerability was found in a port or fork of Redis. It has been declared as critical. This vulnerability affects unknown code in the library C:/Program Files/Redis/dbghelp.dll. The manipulation leads to uncontrolled search path. The attack can be i...
CVE-2022-3647
- EPSS 0.13%
- Veröffentlicht 21.10.2022 18:15:10
- Zuletzt bearbeitet 21.11.2024 07:19:57
** DISPUTED ** A vulnerability, which was classified as problematic, was found in Redis up to 6.2.7/7.0.5. Affected is the function sigsegvHandler of the file debug.c of the component Crash Report. The manipulation leads to denial of service. The com...
CVE-2022-35951
- EPSS 81.37%
- Veröffentlicht 23.09.2022 04:15:11
- Zuletzt bearbeitet 21.11.2024 07:12:02
Redis is an in-memory database that persists on disk. Versions 7.0.0 and above, prior to 7.0.5 are vulnerable to an Integer Overflow. Executing an `XAUTOCLAIM` command on a stream key in a specific state, with a specially crafted `COUNT` argument may...