CVE-2023-36824
- EPSS 90.84%
- Veröffentlicht 11.07.2023 17:15:13
- Zuletzt bearbeitet 10.04.2025 20:54:22
Redis is an in-memory database that persists on disk. In Redit 7.0 prior to 7.0.12, extracting key names from a command and a list of arguments may, in some cases, trigger a heap overflow and result in reading random heap memory, heap corruption and ...
CVE-2023-31655
- EPSS 0.37%
- Veröffentlicht 18.05.2023 20:15:09
- Zuletzt bearbeitet 21.11.2024 08:02:08
redis v7.0.10 was discovered to contain a segmentation violation. This vulnerability allows attackers to cause a Denial of Service (DoS) via unspecified vectors.
CVE-2023-28856
- EPSS 0.12%
- Veröffentlicht 18.04.2023 21:15:09
- Zuletzt bearbeitet 21.11.2024 07:56:10
Redis is an open source, in-memory database that persists on disk. Authenticated users can use the `HINCRBYFLOAT` command to create an invalid hash field that will crash Redis on access in affected versions. This issue has been addressed in in versio...
CVE-2023-28425
- EPSS 45.08%
- Veröffentlicht 20.03.2023 20:15:52
- Zuletzt bearbeitet 21.11.2024 07:55:02
Redis is an in-memory database that persists on disk. Starting in version 7.0.8 and prior to version 7.0.10, authenticated users can use the MSETNX command to trigger a runtime assertion and termination of the Redis server process. The problem is fix...
CVE-2023-25155
- EPSS 2.73%
- Veröffentlicht 02.03.2023 04:15:10
- Zuletzt bearbeitet 21.11.2024 07:49:12
Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted `SRANDMEMBER`, `ZRANDMEMBER`, and `HRANDFIELD` commands can trigger an integer overflow, resulting in a runtime assertion and termination of the Redis...
CVE-2022-36021
- EPSS 59.4%
- Veröffentlicht 01.03.2023 16:15:09
- Zuletzt bearbeitet 21.11.2024 07:12:12
Redis is an in-memory database that persists on disk. Authenticated users can use string matching commands (like `SCAN` or `KEYS`) with a specially crafted pattern to trigger a denial-of-service attack on Redis, causing it to hang and consume 100% CP...
CVE-2023-22458
- EPSS 67.78%
- Veröffentlicht 20.01.2023 19:15:17
- Zuletzt bearbeitet 21.11.2024 07:44:50
Redis is an in-memory database that persists on disk. Authenticated users can issue a `HRANDFIELD` or `ZRANDMEMBER` command with specially crafted arguments to trigger a denial-of-service by crashing Redis with an assertion failure. This problem affe...
CVE-2022-35977
- EPSS 29.2%
- Veröffentlicht 20.01.2023 19:15:14
- Zuletzt bearbeitet 03.11.2025 22:15:59
Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted `SETRANGE` and `SORT(_RO)` commands can trigger an integer overflow, resulting with Redis attempting to allocate impossible amounts of memory and abor...
CVE-2022-3734
- EPSS 0.46%
- Veröffentlicht 28.10.2022 08:15:14
- Zuletzt bearbeitet 21.11.2024 07:20:07
A vulnerability was found in a port or fork of Redis. It has been declared as critical. This vulnerability affects unknown code in the library C:/Program Files/Redis/dbghelp.dll. The manipulation leads to uncontrolled search path. The attack can be i...
CVE-2022-3647
- EPSS 0.11%
- Veröffentlicht 21.10.2022 18:15:10
- Zuletzt bearbeitet 21.11.2024 07:19:57
** DISPUTED ** A vulnerability, which was classified as problematic, was found in Redis up to 6.2.7/7.0.5. Affected is the function sigsegvHandler of the file debug.c of the component Crash Report. The manipulation leads to denial of service. The com...