Логотип exploitDog
bind: "CVE-2022-3647"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2022-3647"

Количество 10

Количество 10

ubuntu логотип

CVE-2022-3647

больше 2 лет назад

** DISPUTED ** A vulnerability, which was classified as problematic, was found in Redis up to 6.2.7/7.0.5. Affected is the function sigsegvHandler of the file debug.c of the component Crash Report. The manipulation leads to denial of service. The complexity of an attack is rather high. The exploitability is told to be difficult. The real existence of this vulnerability is still doubted at the moment. Upgrading to version 6.2.8 and 7.0.6 is able to address this issue. The patch is identified as 0bf90d944313919eb8e63d3588bf63a367f020a3. It is recommended to apply a patch to fix this issue. VDB-211962 is the identifier assigned to this vulnerability. NOTE: The vendor claims that this is not a DoS because it applies to the crash logging mechanism which is triggered after a crash has occurred.

CVSS3: 3.1
EPSS: Низкий
redhat логотип

CVE-2022-3647

больше 2 лет назад

** DISPUTED ** A vulnerability, which was classified as problematic, was found in Redis up to 6.2.7/7.0.5. Affected is the function sigsegvHandler of the file debug.c of the component Crash Report. The manipulation leads to denial of service. The complexity of an attack is rather high. The exploitability is told to be difficult. The real existence of this vulnerability is still doubted at the moment. Upgrading to version 6.2.8 and 7.0.6 is able to address this issue. The patch is identified as 0bf90d944313919eb8e63d3588bf63a367f020a3. It is recommended to apply a patch to fix this issue. VDB-211962 is the identifier assigned to this vulnerability. NOTE: The vendor claims that this is not a DoS because it applies to the crash logging mechanism which is triggered after a crash has occurred.

CVSS3: 2.3
EPSS: Низкий
nvd логотип

CVE-2022-3647

больше 2 лет назад

** DISPUTED ** A vulnerability, which was classified as problematic, was found in Redis up to 6.2.7/7.0.5. Affected is the function sigsegvHandler of the file debug.c of the component Crash Report. The manipulation leads to denial of service. The complexity of an attack is rather high. The exploitability is told to be difficult. The real existence of this vulnerability is still doubted at the moment. Upgrading to version 6.2.8 and 7.0.6 is able to address this issue. The patch is identified as 0bf90d944313919eb8e63d3588bf63a367f020a3. It is recommended to apply a patch to fix this issue. VDB-211962 is the identifier assigned to this vulnerability. NOTE: The vendor claims that this is not a DoS because it applies to the crash logging mechanism which is triggered after a crash has occurred.

CVSS3: 3.1
EPSS: Низкий
msrc логотип

CVE-2022-3647

больше 2 лет назад

CVSS3: 3.3
EPSS: Низкий
debian логотип

CVE-2022-3647

больше 2 лет назад

** DISPUTED ** A vulnerability, which was classified as problematic, w ...

CVSS3: 3.1
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4169-1

больше 2 лет назад

Security update for redis

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4168-1

больше 2 лет назад

Security update for redis

EPSS: Низкий
redos логотип

ROS-20221025-02

больше 2 лет назад

Уязвимость Redis

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-8vvp-2mv7-px5c

больше 2 лет назад

A vulnerability, which was classified as problematic, was found in Redis. Affected is the function sigsegvHandler of the file debug.c of the component Crash Report. The manipulation leads to denial of service. The name of the patch is 0bf90d944313919eb8e63d3588bf63a367f020a3. It is recommended to apply a patch to fix this issue. VDB-211962 is the identifier assigned to this vulnerability.

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2022-06489

больше 2 лет назад

Уязвимость компонента Crash Report функции sigsegvHandler файла debug.c системы управления базами данных Redis, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2022-3647

** DISPUTED ** A vulnerability, which was classified as problematic, was found in Redis up to 6.2.7/7.0.5. Affected is the function sigsegvHandler of the file debug.c of the component Crash Report. The manipulation leads to denial of service. The complexity of an attack is rather high. The exploitability is told to be difficult. The real existence of this vulnerability is still doubted at the moment. Upgrading to version 6.2.8 and 7.0.6 is able to address this issue. The patch is identified as 0bf90d944313919eb8e63d3588bf63a367f020a3. It is recommended to apply a patch to fix this issue. VDB-211962 is the identifier assigned to this vulnerability. NOTE: The vendor claims that this is not a DoS because it applies to the crash logging mechanism which is triggered after a crash has occurred.

CVSS3: 3.1
0%
Низкий
больше 2 лет назад
redhat логотип
CVE-2022-3647

** DISPUTED ** A vulnerability, which was classified as problematic, was found in Redis up to 6.2.7/7.0.5. Affected is the function sigsegvHandler of the file debug.c of the component Crash Report. The manipulation leads to denial of service. The complexity of an attack is rather high. The exploitability is told to be difficult. The real existence of this vulnerability is still doubted at the moment. Upgrading to version 6.2.8 and 7.0.6 is able to address this issue. The patch is identified as 0bf90d944313919eb8e63d3588bf63a367f020a3. It is recommended to apply a patch to fix this issue. VDB-211962 is the identifier assigned to this vulnerability. NOTE: The vendor claims that this is not a DoS because it applies to the crash logging mechanism which is triggered after a crash has occurred.

CVSS3: 2.3
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2022-3647

** DISPUTED ** A vulnerability, which was classified as problematic, was found in Redis up to 6.2.7/7.0.5. Affected is the function sigsegvHandler of the file debug.c of the component Crash Report. The manipulation leads to denial of service. The complexity of an attack is rather high. The exploitability is told to be difficult. The real existence of this vulnerability is still doubted at the moment. Upgrading to version 6.2.8 and 7.0.6 is able to address this issue. The patch is identified as 0bf90d944313919eb8e63d3588bf63a367f020a3. It is recommended to apply a patch to fix this issue. VDB-211962 is the identifier assigned to this vulnerability. NOTE: The vendor claims that this is not a DoS because it applies to the crash logging mechanism which is triggered after a crash has occurred.

CVSS3: 3.1
0%
Низкий
больше 2 лет назад
msrc логотип
CVSS3: 3.3
0%
Низкий
больше 2 лет назад
debian логотип
CVE-2022-3647

** DISPUTED ** A vulnerability, which was classified as problematic, w ...

CVSS3: 3.1
0%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2022:4169-1

Security update for redis

0%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2022:4168-1

Security update for redis

0%
Низкий
больше 2 лет назад
redos логотип
ROS-20221025-02

Уязвимость Redis

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
github логотип
GHSA-8vvp-2mv7-px5c

A vulnerability, which was classified as problematic, was found in Redis. Affected is the function sigsegvHandler of the file debug.c of the component Crash Report. The manipulation leads to denial of service. The name of the patch is 0bf90d944313919eb8e63d3588bf63a367f020a3. It is recommended to apply a patch to fix this issue. VDB-211962 is the identifier assigned to this vulnerability.

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2022-06489

Уязвимость компонента Crash Report функции sigsegvHandler файла debug.c системы управления базами данных Redis, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу