Логотип exploitDog
bind: "CVE-2024-31449"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2024-31449"

Количество 15

Количество 15

ubuntu логотип

CVE-2024-31449

10 месяцев назад

Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 7
EPSS: Низкий
redhat логотип

CVE-2024-31449

10 месяцев назад

Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2024-31449

10 месяцев назад

Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 7
EPSS: Низкий
msrc логотип

CVE-2024-31449

10 месяцев назад

CVSS3: 7
EPSS: Низкий
debian логотип

CVE-2024-31449

10 месяцев назад

Redis is an open source, in-memory database that persists on disk. An ...

CVSS3: 7
EPSS: Низкий
fstec логотип

BDU:2024-07792

10 месяцев назад

Уязвимость системы управления базами данных (СУБД) Redis, связанная с переполнением буфера в стеке, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3575-1

10 месяцев назад

Security update for redis

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0081-1

7 месяцев назад

Security update for redis

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3549-1

10 месяцев назад

Security update for redis7

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3537-1

10 месяцев назад

Security update for redis7

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3535-1

10 месяцев назад

Security update for redis

EPSS: Низкий
redos логотип

ROS-20241017-05

10 месяцев назад

Множественные уязвимости redis

CVSS3: 8.8
EPSS: Низкий
oracle-oval логотип

ELSA-2025-0693

7 месяцев назад

ELSA-2025-0693: redis security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-10869

8 месяцев назад

ELSA-2024-10869: redis:7 security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-0595

7 месяцев назад

ELSA-2025-0595: redis:6 security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-31449

Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 7
1%
Низкий
10 месяцев назад
redhat логотип
CVE-2024-31449

Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 7
1%
Низкий
10 месяцев назад
nvd логотип
CVE-2024-31449

Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 7
1%
Низкий
10 месяцев назад
msrc логотип
CVSS3: 7
1%
Низкий
10 месяцев назад
debian логотип
CVE-2024-31449

Redis is an open source, in-memory database that persists on disk. An ...

CVSS3: 7
1%
Низкий
10 месяцев назад
fstec логотип
BDU:2024-07792

Уязвимость системы управления базами данных (СУБД) Redis, связанная с переполнением буфера в стеке, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
1%
Низкий
10 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3575-1

Security update for redis

10 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0081-1

Security update for redis

7 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3549-1

Security update for redis7

10 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3537-1

Security update for redis7

10 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3535-1

Security update for redis

10 месяцев назад
redos логотип
ROS-20241017-05

Множественные уязвимости redis

CVSS3: 8.8
10 месяцев назад
oracle-oval логотип
ELSA-2025-0693

ELSA-2025-0693: redis security update (IMPORTANT)

7 месяцев назад
oracle-oval логотип
ELSA-2024-10869

ELSA-2024-10869: redis:7 security update (MODERATE)

8 месяцев назад
oracle-oval логотип
ELSA-2025-0595

ELSA-2025-0595: redis:6 security update (IMPORTANT)

7 месяцев назад

Уязвимостей на страницу