Логотип exploitDog
bind: "CVE-2025-62507"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2025-62507"

Количество 4

Количество 4

ubuntu логотип

CVE-2025-62507

26 дней назад

Redis is an open source, in-memory database that persists on disk. In versions 8.2.0 and above, a user can run the XACKDEL command with multiple ID's and trigger a stack buffer overflow, which may potentially lead to remote code execution. This issue is fixed in version 8.2.3. To workaround this issue without patching the redis-server executable is to prevent users from executing XACKDEL operation. This can be done using ACL to restrict XACKDEL command.

EPSS: Низкий
nvd логотип

CVE-2025-62507

26 дней назад

Redis is an open source, in-memory database that persists on disk. In versions 8.2.0 and above, a user can run the XACKDEL command with multiple ID's and trigger a stack buffer overflow, which may potentially lead to remote code execution. This issue is fixed in version 8.2.3. To workaround this issue without patching the redis-server executable is to prevent users from executing XACKDEL operation. This can be done using ACL to restrict XACKDEL command.

EPSS: Низкий
debian логотип

CVE-2025-62507

26 дней назад

Redis is an open source, in-memory database that persists on disk. In ...

EPSS: Низкий
redos логотип

ROS-20251125-11

6 дней назад

Уязвимость redis

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-62507

Redis is an open source, in-memory database that persists on disk. In versions 8.2.0 and above, a user can run the XACKDEL command with multiple ID's and trigger a stack buffer overflow, which may potentially lead to remote code execution. This issue is fixed in version 8.2.3. To workaround this issue without patching the redis-server executable is to prevent users from executing XACKDEL operation. This can be done using ACL to restrict XACKDEL command.

0%
Низкий
26 дней назад
nvd логотип
CVE-2025-62507

Redis is an open source, in-memory database that persists on disk. In versions 8.2.0 and above, a user can run the XACKDEL command with multiple ID's and trigger a stack buffer overflow, which may potentially lead to remote code execution. This issue is fixed in version 8.2.3. To workaround this issue without patching the redis-server executable is to prevent users from executing XACKDEL operation. This can be done using ACL to restrict XACKDEL command.

0%
Низкий
26 дней назад
debian логотип
CVE-2025-62507

Redis is an open source, in-memory database that persists on disk. In ...

0%
Низкий
26 дней назад
redos логотип
ROS-20251125-11

Уязвимость redis

CVSS3: 9.8
0%
Низкий
6 дней назад

Уязвимостей на страницу