Количество 60
Количество 60
ELSA-2025-19675
ELSA-2025-19675: valkey security update (IMPORTANT)
ELSA-2025-19345
ELSA-2025-19345: redis:7 security update (IMPORTANT)
ELSA-2025-19238
ELSA-2025-19238: redis:6 security update (IMPORTANT)
ELSA-2025-19237
ELSA-2025-19237: redis security update (IMPORTANT)
openSUSE-SU-2025:20121-1
Security update for redis
ROS-20251029-06
Множественные уязвимости redis
CVE-2025-46817
Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to cause an integer overflow and potentially lead to remote code execution The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2.
CVE-2025-46817
Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to cause an integer overflow and potentially lead to remote code execution The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2.
CVE-2025-46817
Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to cause an integer overflow and potentially lead to remote code execution The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2.
CVE-2025-46817
Lua library commands may lead to integer overflow and potential RCE
CVE-2025-46817
Redis is an open source, in-memory database that persists on disk. Ver ...
BDU:2025-12820
Уязвимость системы управления базами данных (СУБД) Redis, связанная с целочисленным переполнением, позволяющая нарушителю выполнить произвольный код
ROS-20251217-7322
Уязвимость valkey
BDU:2025-01671
Уязвимость компонентов drm/amd/display ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
CVE-2025-46818
Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user. The problem exists in all versions of Redis with LUA scripting. This issue is fixed in version 8.2.2. A workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing LUA scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families.
CVE-2025-46818
Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user. The problem exists in all versions of Redis with LUA scripting. This issue is fixed in version 8.2.2. A workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing LUA scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families.
CVE-2025-46818
Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user. The problem exists in all versions of Redis with LUA scripting. This issue is fixed in version 8.2.2. A workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing LUA scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families.
CVE-2025-46818
Redis: Authenticated users can execute LUA scripts as a different user
CVE-2025-46818
Redis is an open source, in-memory database that persists on disk. Ver ...
BDU:2025-12557
Уязвимость системы управления базами данных (СУБД) Redis, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
ELSA-2025-19675 ELSA-2025-19675: valkey security update (IMPORTANT) | 5 месяцев назад | |||
ELSA-2025-19345 ELSA-2025-19345: redis:7 security update (IMPORTANT) | 5 месяцев назад | |||
ELSA-2025-19238 ELSA-2025-19238: redis:6 security update (IMPORTANT) | 5 месяцев назад | |||
ELSA-2025-19237 ELSA-2025-19237: redis security update (IMPORTANT) | 5 месяцев назад | |||
openSUSE-SU-2025:20121-1 Security update for redis | 4 месяца назад | |||
ROS-20251029-06 Множественные уязвимости redis | CVSS3: 9.9 | 5 месяцев назад | ||
CVE-2025-46817 Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to cause an integer overflow and potentially lead to remote code execution The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. | CVSS3: 7 | 13% Средний | 6 месяцев назад | |
CVE-2025-46817 Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to cause an integer overflow and potentially lead to remote code execution The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. | CVSS3: 8.8 | 13% Средний | 6 месяцев назад | |
CVE-2025-46817 Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to cause an integer overflow and potentially lead to remote code execution The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. | CVSS3: 7 | 13% Средний | 6 месяцев назад | |
CVE-2025-46817 Lua library commands may lead to integer overflow and potential RCE | CVSS3: 7 | 13% Средний | 6 месяцев назад | |
CVE-2025-46817 Redis is an open source, in-memory database that persists on disk. Ver ... | CVSS3: 7 | 13% Средний | 6 месяцев назад | |
BDU:2025-12820 Уязвимость системы управления базами данных (СУБД) Redis, связанная с целочисленным переполнением, позволяющая нарушителю выполнить произвольный код | CVSS3: 9.8 | 13% Средний | 6 месяцев назад | |
ROS-20251217-7322 Уязвимость valkey | CVSS3: 9.8 | 13% Средний | 4 месяца назад | |
BDU:2025-01671 Уязвимость компонентов drm/amd/display ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | почти 2 года назад | |
CVE-2025-46818 Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user. The problem exists in all versions of Redis with LUA scripting. This issue is fixed in version 8.2.2. A workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing LUA scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families. | CVSS3: 6 | 3% Низкий | 6 месяцев назад | |
CVE-2025-46818 Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user. The problem exists in all versions of Redis with LUA scripting. This issue is fixed in version 8.2.2. A workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing LUA scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families. | CVSS3: 6 | 3% Низкий | 6 месяцев назад | |
CVE-2025-46818 Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user. The problem exists in all versions of Redis with LUA scripting. This issue is fixed in version 8.2.2. A workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing LUA scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families. | CVSS3: 6 | 3% Низкий | 6 месяцев назад | |
CVE-2025-46818 Redis: Authenticated users can execute LUA scripts as a different user | CVSS3: 6 | 3% Низкий | 4 месяца назад | |
CVE-2025-46818 Redis is an open source, in-memory database that persists on disk. Ver ... | CVSS3: 6 | 3% Низкий | 6 месяцев назад | |
BDU:2025-12557 Уязвимость системы управления базами данных (СУБД) Redis, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный код | CVSS3: 6 | 3% Низкий | 6 месяцев назад |
Уязвимостей на страницу