Lucene search

K
RedislabsRedis

22 matches found

CVE
CVE
added 2021/02/26 10:15 p.m.423 views

CVE-2021-21309

Redis is an open-source, in-memory database that persists on disk. In affected versions of Redis an integer overflow bug in 32-bit Redis version 4.0 or newer could be exploited to corrupt the heap and potentially result with remote code execution. Redis 4.0 or newer uses a configurable limit for th...

8.8CVSS7.5AI score0.00529EPSS
CVE
CVE
added 2021/05/04 4:15 p.m.358 views

CVE-2021-29477

Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis version 6.0 or newer could be exploited using the STRALGO LCS command to corrupt the heap and potentially result with remote code execution. The pr...

8.8CVSS7.9AI score0.01919EPSS
CVE
CVE
added 2019/07/11 7:15 p.m.284 views

CVE-2019-10192

A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding to write up...

7.2CVSS6.8AI score0.16771EPSS
CVE
CVE
added 2021/07/21 9:15 p.m.284 views

CVE-2021-32761

Redis is an in-memory database that persists on disk. A vulnerability involving out-of-bounds read and integer overflow to buffer overflow exists starting with version 2.2 and prior to versions 5.0.13, 6.0.15, and 6.2.5. On 32-bit systems, Redis *BIT* command are vulnerable to integer overflow that...

7.5CVSS8AI score0.00845EPSS
CVE
CVE
added 2019/07/11 7:15 p.m.266 views

CVE-2019-10193

A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By corrupting a hyperloglog using the SETRANGE command, an attacker could cause Redis to perform controlled increments of up to 12 bytes past t...

7.2CVSS6.8AI score0.34565EPSS
CVE
CVE
added 2021/06/02 8:15 p.m.247 views

CVE-2021-32625

Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis version 6.0 or newer, could be exploited using the STRALGO LCS command to corrupt the heap and potentially result with remote code execution. This ...

8.8CVSS8.1AI score0.01919EPSS
CVE
CVE
added 2020/06/15 6:15 p.m.219 views

CVE-2020-14147

An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large ...

7.7CVSS8AI score0.01207EPSS
CVE
CVE
added 2018/06/17 2:29 p.m.208 views

CVE-2018-12326

Buffer overflow in redis-cli of Redis before 4.0.10 and 5.x before 5.0 RC3 allows an attacker to achieve code execution and escalate to higher privileges via a crafted command line. NOTE: It is unclear whether there are any common situations in which redis-cli is used with, for example, a -h (aka h...

8.4CVSS8.6AI score0.14974EPSS
CVE
CVE
added 2018/06/17 5:29 p.m.196 views

CVE-2018-11219

An Integer Overflow issue was discovered in the struct library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2, leading to a failure of bounds checking.

9.8CVSS7.9AI score0.02402EPSS
CVE
CVE
added 2021/05/04 4:15 p.m.188 views

CVE-2021-29478

Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis 6.2 before 6.2.3 could be exploited to corrupt the heap and potentially result with remote code execution. Redis 6.0 and earlier are not directly a...

8.8CVSS7.7AI score0.00663EPSS
CVE
CVE
added 2018/06/17 5:29 p.m.183 views

CVE-2018-11218

Memory Corruption was discovered in the cmsgpack library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2 because of stack-based buffer overflows.

9.8CVSS8.1AI score0.08094EPSS
CVE
CVE
added 2019/11/01 7:15 p.m.166 views

CVE-2013-0178

Insecure temporary file vulnerability in Redis before 2.6 related to /tmp/redis-%p.vm.

5.5CVSS5.4AI score0.0014EPSS
CVE
CVE
added 2016/04/13 3:59 p.m.151 views

CVE-2015-8080

Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x before 2.8.24 and 3.0.x before 3.0.6 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbo...

7.5CVSS8AI score0.01207EPSS
CVE
CVE
added 2019/11/01 7:15 p.m.150 views

CVE-2013-0180

Insecure temporary file vulnerability in Redis 2.6 related to /tmp/redis.ds.

5.5CVSS5.4AI score0.00045EPSS
CVE
CVE
added 2021/03/31 2:15 p.m.137 views

CVE-2021-3470

A heap overflow issue was found in Redis in versions before 5.0.10, before 6.0.9 and before 6.2.0 when using a heap allocator other than jemalloc or glibc's malloc, leading to potential out of bound write or process crash. Effectively this flaw does not affect the vast majority of users, who use je...

5.3CVSS5.5AI score0.00466EPSS
CVE
CVE
added 2016/08/10 2:59 p.m.102 views

CVE-2013-7458

linenoise, as used in Redis before 3.2.3, uses world-readable permissions for .rediscli_history, which allows local users to obtain sensitive information by reading the file.

3.3CVSS3.2AI score0.00032EPSS
CVE
CVE
added 2015/06/09 2:59 p.m.101 views

CVE-2015-4335

Redis before 2.8.21 and 3.x before 3.0.2 allows remote attackers to execute arbitrary Lua bytecode via the eval command.

10CVSS7AI score0.05651EPSS
CVE
CVE
added 2017/10/24 6:29 p.m.78 views

CVE-2016-10517

networking.c in Redis before 3.2.7 allows "Cross Protocol Scripting" because it lacks a check for POST and Host: strings, which are not valid in the Redis protocol (but commonly occur when an attack triggers an HTTP request to the Redis TCP port).

7.4CVSS7.2AI score0.0024EPSS
CVE
CVE
added 2018/06/16 5:29 p.m.77 views

CVE-2018-12453

Type confusion in the xgroupCommand function in t_stream.c in redis-server in Redis before 5.0 allows remote attackers to cause denial-of-service via an XGROUP command in which the key is not a stream.

7.5CVSS7.4AI score0.28558EPSS
CVE
CVE
added 2017/10/06 4:29 a.m.71 views

CVE-2017-15047

The clusterLoadConfig function in cluster.c in Redis 4.0.2 allows attackers to cause a denial of service (out-of-bounds array index and application crash) or possibly have unspecified other impact by leveraging "limited access to the machine."

9.8CVSS8.8AI score0.00316EPSS
CVE
CVE
added 2016/10/28 2:59 p.m.69 views

CVE-2016-8339

A buffer overflow in Redis 3.2.x prior to 3.2.4 causes arbitrary code execution when a crafted command is sent. An out of bounds write vulnerability exists in the handling of the client-output-buffer-limit option during the CONFIG SET command for the Redis data structure store. A crafted CONFIG SET...

9.8CVSS9.8AI score0.02502EPSS
CVE
CVE
added 2021/09/20 4:15 p.m.49 views

CVE-2020-21468

A segmentation fault in the redis-server component of Redis 5.0.7 leads to a denial of service (DOS). NOTE: the vendor cannot reproduce this issue in a released version, such as 5.0.7

7.5CVSS7.3AI score0.00384EPSS