Количество 6
Количество 6
CVE-2025-62507
Redis is an open source, in-memory database that persists on disk. In versions 8.2.0 and above, a user can run the XACKDEL command with multiple ID's and trigger a stack buffer overflow, which may potentially lead to remote code execution. This issue is fixed in version 8.2.3. To workaround this issue without patching the redis-server executable is to prevent users from executing XACKDEL operation. This can be done using ACL to restrict XACKDEL command.
CVE-2025-62507
Redis is an open source, in-memory database that persists on disk. In versions 8.2.0 and above, a user can run the XACKDEL command with multiple ID's and trigger a stack buffer overflow, which may potentially lead to remote code execution. This issue is fixed in version 8.2.3. To workaround this issue without patching the redis-server executable is to prevent users from executing XACKDEL operation. This can be done using ACL to restrict XACKDEL command.
CVE-2025-62507
Redis is an open source, in-memory database that persists on disk. In ...
BDU:2025-15613
Уязвимость сервера системы управления базами данных (СУБД) Redis, связанная с переполнением буфера в стеке, позволяющая нарушителю выполнить произвольный код
ROS-20251125-11
Уязвимость redis
openSUSE-SU-2025:20121-1
Security update for redis
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-62507 Redis is an open source, in-memory database that persists on disk. In versions 8.2.0 and above, a user can run the XACKDEL command with multiple ID's and trigger a stack buffer overflow, which may potentially lead to remote code execution. This issue is fixed in version 8.2.3. To workaround this issue without patching the redis-server executable is to prevent users from executing XACKDEL operation. This can be done using ACL to restrict XACKDEL command. | CVSS3: 8.8 | 0% Низкий | 2 месяца назад | |
CVE-2025-62507 Redis is an open source, in-memory database that persists on disk. In versions 8.2.0 and above, a user can run the XACKDEL command with multiple ID's and trigger a stack buffer overflow, which may potentially lead to remote code execution. This issue is fixed in version 8.2.3. To workaround this issue without patching the redis-server executable is to prevent users from executing XACKDEL operation. This can be done using ACL to restrict XACKDEL command. | CVSS3: 8.8 | 0% Низкий | 2 месяца назад | |
CVE-2025-62507 Redis is an open source, in-memory database that persists on disk. In ... | CVSS3: 8.8 | 0% Низкий | 2 месяца назад | |
BDU:2025-15613 Уязвимость сервера системы управления базами данных (СУБД) Redis, связанная с переполнением буфера в стеке, позволяющая нарушителю выполнить произвольный код | CVSS3: 8.8 | 0% Низкий | 2 месяца назад | |
ROS-20251125-11 Уязвимость redis | CVSS3: 9.8 | 0% Низкий | около 2 месяцев назад | |
openSUSE-SU-2025:20121-1 Security update for redis | около 2 месяцев назад |
Уязвимостей на страницу