Lucene search

K

46 matches found

CVE
CVE
added 2022/02/18 8:15 p.m.1330 views

CVE-2022-0543

It was discovered, that redis, a persistent key-value database, due to a packaging issue, is prone to a (Debian-specific) Lua sandbox escape, which could result in remote code execution.

10CVSS9.7AI score0.94385EPSS
In wildWeb
CVE
CVE
added 2023/09/06 9:15 p.m.647 views

CVE-2023-41053

Redis is an in-memory database that persists on disk. Redis does not correctly identify keys accessed by SORT_RO and as a result may grant users executing this command access to keys that are not explicitly authorized by the ACL configuration. The problem exists in Redis 7.0 or newer and has been f...

3.3CVSS4.1AI score0.00375EPSS
CVE
CVE
added 2025/01/06 10:15 p.m.549 views

CVE-2024-46981

Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17. An additional workaround to mitigate t...

7CVSS7.1AI score0.69416EPSS
CVE
CVE
added 2021/10/04 6:15 p.m.448 views

CVE-2021-32762

Redis is an open source, in-memory database that persists on disk. The redis-cli command line tool and redis-sentinel service may be vulnerable to integer overflow when parsing specially crafted large multi-bulk network replies. This is a result of a vulnerability in the underlying hiredis library ...

9CVSS8AI score0.00551EPSS
CVE
CVE
added 2021/02/26 10:15 p.m.426 views

CVE-2021-21309

Redis is an open-source, in-memory database that persists on disk. In affected versions of Redis an integer overflow bug in 32-bit Redis version 4.0 or newer could be exploited to corrupt the heap and potentially result with remote code execution. Redis 4.0 or newer uses a configurable limit for th...

8.8CVSS7.5AI score0.00529EPSS
CVE
CVE
added 2024/10/07 8:15 p.m.413 views

CVE-2024-31228

Redis is an open source, in-memory database that persists on disk. Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as KEYS, SCAN, PSUBSCRIBE, FUNCTION LIST, COMMAND LIST and ACL definitions. Matching of extremely ...

5.5CVSS6.1AI score0.00015EPSS
CVE
CVE
added 2021/10/04 6:15 p.m.407 views

CVE-2021-32626

Redis is an open source, in-memory database that persists on disk. In affected versions specially crafted Lua scripts executing in Redis can cause the heap-based Lua stack to be overflowed, due to incomplete checks for this condition. This can result with heap corruption and potentially remote code...

8.8CVSS8.4AI score0.00922EPSS
CVE
CVE
added 2024/10/07 8:15 p.m.407 views

CVE-2024-31227

Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem exists in Redis 7 prior to versions 7.2.6 and 7.4.1. Users a...

4.4CVSS5.3AI score0.00052EPSS
CVE
CVE
added 2024/01/10 4:15 p.m.393 views

CVE-2023-41056

Redis is an in-memory database that persists on disk. Redis incorrectly handles resizing of memory buffers which can result in integer overflow that leads to heap overflow and potential remote code execution. This issue has been patched in version 7.0.15 and 7.2.4.

8.1CVSS8.3AI score0.05119EPSS
CVE
CVE
added 2021/05/04 4:15 p.m.362 views

CVE-2021-29477

Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis version 6.0 or newer could be exploited using the STRALGO LCS command to corrupt the heap and potentially result with remote code execution. The pr...

8.8CVSS7.9AI score0.02224EPSS
CVE
CVE
added 2023/05/18 8:15 p.m.360 views

CVE-2023-31655

redis v7.0.10 was discovered to contain a segmentation violation. This vulnerability allows attackers to cause a Denial of Service (DoS) via unspecified vectors.

7.5CVSS7.2AI score0.00369EPSS
CVE
CVE
added 2024/10/07 8:15 p.m.338 views

CVE-2024-31449

Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting....

7CVSS7AI score0.01413EPSS
Web
CVE
CVE
added 2025/01/06 10:15 p.m.335 views

CVE-2024-51741

Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem is fixed in Redis 7.2.7 and 7.4.2.

4.4CVSS4.7AI score0.00072EPSS
CVE
CVE
added 2023/10/18 9:15 p.m.311 views

CVE-2023-45145

Redis is an in-memory database that persists on disk. On startup, Redis begins listening on a Unix socket before adjusting its permissions to the user-provided configuration. If a permissive umask(2) is used, this creates a race condition that enables, during a short period of time, another process...

3.6CVSS4AI score0.00451EPSS
CVE
CVE
added 2021/10/04 6:15 p.m.287 views

CVE-2021-41099

Redis is an open source, in-memory database that persists on disk. An integer overflow bug in the underlying string library can be used to corrupt the heap and potentially result with denial of service or remote code execution. The vulnerability involves changing the default proto-max-bulk-len conf...

7.5CVSS8.3AI score0.00292EPSS
CVE
CVE
added 2021/07/21 9:15 p.m.285 views

CVE-2021-32761

Redis is an in-memory database that persists on disk. A vulnerability involving out-of-bounds read and integer overflow to buffer overflow exists starting with version 2.2 and prior to versions 5.0.13, 6.0.15, and 6.2.5. On 32-bit systems, Redis *BIT* command are vulnerable to integer overflow that...

7.5CVSS8AI score0.00845EPSS
CVE
CVE
added 2021/10/04 6:15 p.m.259 views

CVE-2021-32672

Redis is an open source, in-memory database that persists on disk. When using the Redis Lua Debugger, users can send malformed requests that cause the debugger’s protocol parser to read data beyond the actual buffer. This issue affects all versions of Redis with Lua debugging support (3.2 or newer)...

5.3CVSS6AI score0.00288EPSS
CVE
CVE
added 2021/10/04 6:15 p.m.258 views

CVE-2021-32687

Redis is an open source, in-memory database that persists on disk. An integer overflow bug affecting all versions of Redis can be exploited to corrupt the heap and potentially be used to leak arbitrary contents of the heap or trigger remote code execution. The vulnerability involves changing the de...

7.5CVSS8.4AI score0.00908EPSS
CVE
CVE
added 2021/10/04 6:15 p.m.255 views

CVE-2021-32628

Redis is an open source, in-memory database that persists on disk. An integer overflow bug in the ziplist data structure used by all versions of Redis can be exploited to corrupt the heap and potentially result with remote code execution. The vulnerability involves modifying the default ziplist con...

7.5CVSS8.4AI score0.00461EPSS
CVE
CVE
added 2023/01/20 7:15 p.m.253 views

CVE-2022-35977

Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted SETRANGE and SORT(_RO) commands can trigger an integer overflow, resulting with Redis attempting to allocate impossible amounts of memory and abort with an out-of-memory (OOM) panic. The problem is f...

5.5CVSS5.7AI score0.46126EPSS
CVE
CVE
added 2021/10/04 6:15 p.m.251 views

CVE-2021-32627

Redis is an open source, in-memory database that persists on disk. In affected versions an integer overflow bug in Redis can be exploited to corrupt the heap and potentially result with remote code execution. The vulnerability involves changing the default proto-max-bulk-len and client-query-buffer...

7.5CVSS8.3AI score0.00626EPSS
CVE
CVE
added 2021/10/04 6:15 p.m.249 views

CVE-2021-32675

Redis is an open source, in-memory database that persists on disk. When parsing an incoming Redis Standard Protocol (RESP) request, Redis allocates memory according to user-specified values which determine the number of elements (in the multi-bulk header) and size of each element (in the bulk heade...

7.5CVSS8.1AI score0.02528EPSS
CVE
CVE
added 2021/06/02 8:15 p.m.248 views

CVE-2021-32625

Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis version 6.0 or newer, could be exploited using the STRALGO LCS command to corrupt the heap and potentially result with remote code execution. This ...

8.8CVSS8.1AI score0.02224EPSS
CVE
CVE
added 2023/01/20 7:15 p.m.246 views

CVE-2023-22458

Redis is an in-memory database that persists on disk. Authenticated users can issue a HRANDFIELD or ZRANDMEMBER command with specially crafted arguments to trigger a denial-of-service by crashing Redis with an assertion failure. This problem affects Redis versions 6.2 or newer up to but not includi...

5.5CVSS5.7AI score0.667EPSS
CVE
CVE
added 2022/04/27 8:15 p.m.223 views

CVE-2022-24735

Redis is an in-memory database that persists on disk. By exploiting weaknesses in the Lua script execution environment, an attacker with access to Redis prior to version 7.0.0 or 6.2.7 can inject Lua code that will execute with the (potentially higher) privileges of another Redis user. The Lua scri...

7.8CVSS6.4AI score0.01946EPSS
CVE
CVE
added 2021/05/04 4:15 p.m.191 views

CVE-2021-29478

Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis 6.2 before 6.2.3 could be exploited to corrupt the heap and potentially result with remote code execution. Redis 6.0 and earlier are not directly a...

8.8CVSS7.7AI score0.00663EPSS
CVE
CVE
added 2023/03/01 4:15 p.m.191 views

CVE-2022-36021

Redis is an in-memory database that persists on disk. Authenticated users can use string matching commands (like SCAN or KEYS) with a specially crafted pattern to trigger a denial-of-service attack on Redis, causing it to hang and consume 100% CPU time. The problem is fixed in Redis versions 6.0.18...

5.5CVSS6AI score0.737EPSS
CVE
CVE
added 2023/07/13 3:15 p.m.184 views

CVE-2022-24834

Redis is an in-memory database that persists on disk. A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson library, and result with heap corruption and potentially remote code execution. The problem exists in all versions of Redis with Lua scripting support, st...

8.8CVSS8.1AI score0.37948EPSS
Web
CVE
CVE
added 2022/04/27 8:15 p.m.183 views

CVE-2022-24736

Redis is an in-memory database that persists on disk. Prior to versions 6.2.7 and 7.0.0, an attacker attempting to load a specially crafted Lua script can cause NULL pointer dereference which will result with a crash of the redis-server process. The problem is fixed in Redis versions 7.0.0 and 6.2....

5.5CVSS5.4AI score0.00354EPSS
CVE
CVE
added 2023/03/02 4:15 a.m.181 views

CVE-2023-25155

Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted SRANDMEMBER, ZRANDMEMBER, and HRANDFIELD commands can trigger an integer overflow, resulting in a runtime assertion and termination of the Redis server process. This problem affects all Redis version...

6.5CVSS6.2AI score0.0296EPSS
CVE
CVE
added 2025/04/23 4:15 p.m.153 views

CVE-2025-21605

Redis is an open source, in-memory database that persists on disk. In versions starting at 2.6 and prior to 7.4.3, An unauthenticated client can cause unlimited growth of output buffers, until the server runs out of memory or is killed. By default, the Redis configuration does not limit the output ...

7.5CVSS7.9AI score0.00061EPSS
CVE
CVE
added 2025/05/29 9:15 a.m.143 views

CVE-2025-27151

Redis is an open source, in-memory database that persists on disk. In versions starting from 7.0.0 to before 8.0.2, a stack-based buffer overflow exists in redis-check-aof due to the use of memcpy with strlen(filepath) when copying a user-supplied file path into a fixed-size stack buffer. This allo...

9.8CVSS7.7AI score0.00055EPSS
CVE
CVE
added 2023/04/18 9:15 p.m.138 views

CVE-2023-28856

Redis is an open source, in-memory database that persists on disk. Authenticated users can use the HINCRBYFLOAT command to create an invalid hash field that will crash Redis on access in affected versions. This issue has been addressed in in versions 7.0.11, 6.2.12, and 6.0.19. Users are advised to...

6.5CVSS6.1AI score0.00122EPSS
CVE
CVE
added 2021/03/31 2:15 p.m.137 views

CVE-2021-3470

A heap overflow issue was found in Redis in versions before 5.0.10, before 6.0.9 and before 6.2.0 when using a heap allocator other than jemalloc or glibc's malloc, leading to potential out of bound write or process crash. Effectively this flaw does not affect the vast majority of users, who use je...

5.3CVSS5.5AI score0.00466EPSS
CVE
CVE
added 2022/10/21 6:15 p.m.132 views

CVE-2022-3647

** DISPUTED ** A vulnerability, which was classified as problematic, was found in Redis up to 6.2.7/7.0.5. Affected is the function sigsegvHandler of the file debug.c of the component Crash Report. The manipulation leads to denial of service. The complexity of an attack is rather high. The exploita...

3.3CVSS3.9AI score0.0013EPSS
CVE
CVE
added 2022/09/23 4:15 a.m.121 views

CVE-2022-35951

Redis is an in-memory database that persists on disk. Versions 7.0.0 and above, prior to 7.0.5 are vulnerable to an Integer Overflow. Executing an XAUTOCLAIM command on a stream key in a specific state, with a specially crafted COUNT argument may cause an integer overflow, a subsequent heap overflo...

9.8CVSS8.5AI score0.8402EPSS
CVE
CVE
added 2023/03/20 8:15 p.m.120 views

CVE-2023-28425

Redis is an in-memory database that persists on disk. Starting in version 7.0.8 and prior to version 7.0.10, authenticated users can use the MSETNX command to trigger a runtime assertion and termination of the Redis server process. The problem is fixed in Redis version 7.0.10.

5.5CVSS5.6AI score0.27369EPSS
CVE
CVE
added 2022/07/19 9:15 p.m.118 views

CVE-2022-31144

Redis is an in-memory database that persists on disk. A specially crafted XAUTOCLAIM command on a stream key in a specific state may result with heap overflow, and potentially remote code execution. This problem affects versions on the 7.x branch prior to 7.0.4. The patch is released in version 7.0...

8.8CVSS8AI score0.09415EPSS
CVE
CVE
added 2023/07/11 5:15 p.m.109 views

CVE-2023-36824

Redis is an in-memory database that persists on disk. In Redit 7.0 prior to 7.0.12, extracting key names from a command and a list of arguments may, in some cases, trigger a heap overflow and result in reading random heap memory, heap corruption and potentially remote code execution. Several scenar...

8.8CVSS8.5AI score0.90842EPSS
CVE
CVE
added 2025/07/07 4:15 p.m.101 views

CVE-2025-32023

Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The b...

7CVSS7.1AI score0.00267EPSS
Web
CVE
CVE
added 2023/07/15 11:15 p.m.84 views

CVE-2021-31294

Redis before 6cbea7d allows a replica to cause an assertion failure in a primary server by sending a non-administrative command (specifically, a SET command). NOTE: this was fixed for Redis 6.2.x and 7.x in 2021. Versions before 6.2 were not intended to have safety guarantees related to this.

5.9CVSS5.8AI score0.00214EPSS
CVE
CVE
added 2022/06/23 5:15 p.m.79 views

CVE-2022-33105

Redis v7.0 was discovered to contain a memory leak via the component streamGetEdgeID.

7.5CVSS7.4AI score0.00502EPSS
CVE
CVE
added 2022/10/28 8:15 a.m.70 views

CVE-2022-3734

A vulnerability was found in a port or fork of Redis. It has been declared as critical. This vulnerability affects unknown code in the library C:/Program Files/Redis/dbghelp.dll. The manipulation leads to uncontrolled search path. The attack can be initiated remotely. The exploit has been disclosed...

9.8CVSS7.9AI score0.00151EPSS
CVE
CVE
added 2016/10/28 2:59 p.m.69 views

CVE-2016-8339

A buffer overflow in Redis 3.2.x prior to 3.2.4 causes arbitrary code execution when a crafted command is sent. An out of bounds write vulnerability exists in the handling of the client-output-buffer-limit option during the CONFIG SET command for the Redis data structure store. A crafted CONFIG SET...

9.8CVSS9.8AI score0.02487EPSS
Web
CVE
CVE
added 2025/07/07 4:15 p.m.69 views

CVE-2025-48367

Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19.

7.5CVSS6.4AI score0.00037EPSS
CVE
CVE
added 2025/07/23 7:15 p.m.20 views

CVE-2025-46686

Redis through 8.0.3 allows memory consumption via a multi-bulk command composed of many bulks, sent by an authenticated user. This occurs because the server allocates memory for the command arguments of every bulk, even when the command is skipped because of insufficient permissions. NOTE: this is ...

3.5CVSS6.4AI score0.00028EPSS