CVE-2019-10193
- EPSS 34.53%
- Veröffentlicht 11.07.2019 19:15:12
- Zuletzt bearbeitet 21.11.2024 04:18:37
A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By corrupting a hyperloglog using the SETRANGE command, an attacker could cause Redis to perfo...
CVE-2019-10192
- EPSS 22.48%
- Veröffentlicht 11.07.2019 19:15:12
- Zuletzt bearbeitet 21.11.2024 04:18:37
A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis...
CVE-2018-11219
- EPSS 3.48%
- Veröffentlicht 17.06.2018 17:29:00
- Zuletzt bearbeitet 21.11.2024 03:42:55
An Integer Overflow issue was discovered in the struct library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2, leading to a failure of bounds checking.
CVE-2018-11218
- EPSS 18.92%
- Veröffentlicht 17.06.2018 17:29:00
- Zuletzt bearbeitet 21.11.2024 03:42:55
Memory Corruption was discovered in the cmsgpack library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2 because of stack-based buffer overflows.
CVE-2018-12326
- EPSS 28.11%
- Veröffentlicht 17.06.2018 14:29:00
- Zuletzt bearbeitet 21.11.2024 03:44:59
Buffer overflow in redis-cli of Redis before 4.0.10 and 5.x before 5.0 RC3 allows an attacker to achieve code execution and escalate to higher privileges via a crafted command line. NOTE: It is unclear whether there are any common situations in which...
CVE-2018-12453
- EPSS 31.96%
- Veröffentlicht 16.06.2018 17:29:00
- Zuletzt bearbeitet 21.11.2024 03:45:14
Type confusion in the xgroupCommand function in t_stream.c in redis-server in Redis before 5.0 allows remote attackers to cause denial-of-service via an XGROUP command in which the key is not a stream.
CVE-2016-10517
- EPSS 0.29%
- Veröffentlicht 24.10.2017 18:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
networking.c in Redis before 3.2.7 allows "Cross Protocol Scripting" because it lacks a check for POST and Host: strings, which are not valid in the Redis protocol (but commonly occur when an attack triggers an HTTP request to the Redis TCP port).
CVE-2017-15047
- EPSS 0.37%
- Veröffentlicht 06.10.2017 04:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
The clusterLoadConfig function in cluster.c in Redis 4.0.2 allows attackers to cause a denial of service (out-of-bounds array index and application crash) or possibly have unspecified other impact by leveraging "limited access to the machine."
CVE-2016-8339
- EPSS 2.49%
- Veröffentlicht 28.10.2016 14:59:01
- Zuletzt bearbeitet 12.04.2025 10:46:40
A buffer overflow in Redis 3.2.x prior to 3.2.4 causes arbitrary code execution when a crafted command is sent. An out of bounds write vulnerability exists in the handling of the client-output-buffer-limit option during the CONFIG SET command for the...
CVE-2013-7458
- EPSS 0.03%
- Veröffentlicht 10.08.2016 14:59:00
- Zuletzt bearbeitet 12.04.2025 10:46:40
linenoise, as used in Redis before 3.2.3, uses world-readable permissions for .rediscli_history, which allows local users to obtain sensitive information by reading the file.