Логотип exploitDog
bind:"CVE-2025-27151" OR bind:"CVE-2025-32023" OR bind:"CVE-2025-48367"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-27151" OR bind:"CVE-2025-32023" OR bind:"CVE-2025-48367"

Количество 38

Количество 38

suse-cvrf логотип

SUSE-SU-2025:02231-1

4 месяца назад

Security update for valkey

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:01942-1

5 месяцев назад

Security update for valkey

EPSS: Низкий
ubuntu логотип

CVE-2025-48367

4 месяца назад

Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2025-48367

4 месяца назад

Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2025-48367

4 месяца назад

Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2025-48367

3 месяца назад

Redis DoS Vulnerability due to bad connection error handling

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2025-48367

4 месяца назад

Redis is an open source, in-memory database that persists on disk. An ...

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2025-32023

4 месяца назад

Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands.

CVSS3: 7
EPSS: Низкий
redhat логотип

CVE-2025-32023

4 месяца назад

Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands.

CVSS3: 8.8
EPSS: Низкий
nvd логотип

CVE-2025-32023

4 месяца назад

Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands.

CVSS3: 7
EPSS: Низкий
msrc логотип

CVE-2025-32023

3 месяца назад

Redis allows out of bounds writes in hyperloglog commands leading to RCE

CVSS3: 7
EPSS: Низкий
debian логотип

CVE-2025-32023

4 месяца назад

Redis is an open source, in-memory database that persists on disk. Fro ...

CVSS3: 7
EPSS: Низкий
fstec логотип

BDU:2025-09081

4 месяца назад

Уязвимость сервера системы управления базами данных (СУБД) Redis, связанная с неограниченным распределением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2025-08113

4 месяца назад

Уязвимость сервера системы управления базами данных (СУБД) Redis, позволяющая нарушителю выполнить произвольный код

CVSS3: 7
EPSS: Низкий
redos логотип

ROS-20250905-06

2 месяца назад

Уязвимость redis

CVSS3: 7.5
EPSS: Низкий
redos логотип

ROS-20250905-05

2 месяца назад

Уязвимость valkey

CVSS3: 7.5
EPSS: Низкий
redos логотип

ROS-20250904-11

2 месяца назад

Уязвимость valkey

CVSS2: 6
EPSS: Низкий
redos логотип

ROS-20250904-12

2 месяца назад

Множественные уязвимости redis

CVSS3: 4.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
SUSE-SU-2025:02231-1

Security update for valkey

4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:01942-1

Security update for valkey

5 месяцев назад
ubuntu логотип
CVE-2025-48367

Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19.

CVSS3: 7.5
0%
Низкий
4 месяца назад
redhat логотип
CVE-2025-48367

Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19.

CVSS3: 5.3
0%
Низкий
4 месяца назад
nvd логотип
CVE-2025-48367

Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19.

CVSS3: 7.5
0%
Низкий
4 месяца назад
msrc логотип
CVE-2025-48367

Redis DoS Vulnerability due to bad connection error handling

CVSS3: 7.5
0%
Низкий
3 месяца назад
debian логотип
CVE-2025-48367

Redis is an open source, in-memory database that persists on disk. An ...

CVSS3: 7.5
0%
Низкий
4 месяца назад
ubuntu логотип
CVE-2025-32023

Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands.

CVSS3: 7
0%
Низкий
4 месяца назад
redhat логотип
CVE-2025-32023

Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands.

CVSS3: 8.8
0%
Низкий
4 месяца назад
nvd логотип
CVE-2025-32023

Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands.

CVSS3: 7
0%
Низкий
4 месяца назад
msrc логотип
CVE-2025-32023

Redis allows out of bounds writes in hyperloglog commands leading to RCE

CVSS3: 7
0%
Низкий
3 месяца назад
debian логотип
CVE-2025-32023

Redis is an open source, in-memory database that persists on disk. Fro ...

CVSS3: 7
0%
Низкий
4 месяца назад
fstec логотип
BDU:2025-09081

Уязвимость сервера системы управления базами данных (СУБД) Redis, связанная с неограниченным распределением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
4 месяца назад
fstec логотип
BDU:2025-08113

Уязвимость сервера системы управления базами данных (СУБД) Redis, позволяющая нарушителю выполнить произвольный код

CVSS3: 7
0%
Низкий
4 месяца назад
redos логотип
ROS-20250905-06

Уязвимость redis

CVSS3: 7.5
0%
Низкий
2 месяца назад
redos логотип
ROS-20250905-05

Уязвимость valkey

CVSS3: 7.5
0%
Низкий
2 месяца назад
redos логотип
ROS-20250904-11

Уязвимость valkey

CVSS2: 6
0%
Низкий
2 месяца назад
redos логотип
ROS-20250904-12

Множественные уязвимости redis

CVSS3: 4.9
2 месяца назад

Уязвимостей на страницу