Количество 36
Количество 36
CVE-2025-46818
Redis is an open source, in-memory database that persists on disk. Ver ...
BDU:2025-12557
Уязвимость системы управления базами данных (СУБД) Redis, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный код
CVE-2025-46819
Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted LUA script to read out-of-bound data or crash the server and subsequent denial of service. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families.
CVE-2025-46819
Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted LUA script to read out-of-bound data or crash the server and subsequent denial of service. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families.
CVE-2025-46819
Redis is vulnerable to DoS via specially crafted LUA scripts
CVE-2025-46819
Redis is an open source, in-memory database that persists on disk. Ver ...
CVE-2025-49844
Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.
CVE-2025-49844
Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.
CVE-2025-49844
Redis Lua Use-After-Free may lead to remote code execution
CVE-2025-49844
Redis is an open source, in-memory database that persists on disk. Ver ...
ELSA-2025-20656
ELSA-2025-20656: redis security update (CRITICAL)
ELSA-2025-20655
ELSA-2025-20655: redis security update (IMPORTANT)
ELSA-2025-20654
ELSA-2025-20654: redis security update (IMPORTANT)
ELSA-2025-20653
ELSA-2025-20653: valkey security update (IMPORTANT)
BDU:2025-12553
Уязвимость системы управления базами данных (СУБД) Redis, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольный код
BDU:2025-01657
Уязвимость компонентов drm/amdgpu ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-46818 Redis is an open source, in-memory database that persists on disk. Ver ... | CVSS3: 6 | 4% Низкий | около 1 месяца назад | |
BDU:2025-12557 Уязвимость системы управления базами данных (СУБД) Redis, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный код | CVSS3: 6 | 4% Низкий | около 1 месяца назад | |
CVE-2025-46819 Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted LUA script to read out-of-bound data or crash the server and subsequent denial of service. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families. | CVSS3: 6.3 | 6% Низкий | около 1 месяца назад | |
CVE-2025-46819 Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted LUA script to read out-of-bound data or crash the server and subsequent denial of service. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families. | CVSS3: 6.3 | 6% Низкий | около 1 месяца назад | |
CVE-2025-46819 Redis is vulnerable to DoS via specially crafted LUA scripts | CVSS3: 6.3 | 6% Низкий | 25 дней назад | |
CVE-2025-46819 Redis is an open source, in-memory database that persists on disk. Ver ... | CVSS3: 6.3 | 6% Низкий | около 1 месяца назад | |
CVE-2025-49844 Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands. | CVSS3: 9.9 | 7% Низкий | около 1 месяца назад | |
CVE-2025-49844 Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands. | CVSS3: 9.9 | 7% Низкий | около 1 месяца назад | |
CVE-2025-49844 Redis Lua Use-After-Free may lead to remote code execution | CVSS3: 9.9 | 7% Низкий | 27 дней назад | |
CVE-2025-49844 Redis is an open source, in-memory database that persists on disk. Ver ... | CVSS3: 9.9 | 7% Низкий | около 1 месяца назад | |
ELSA-2025-20656 ELSA-2025-20656: redis security update (CRITICAL) | 27 дней назад | |||
ELSA-2025-20655 ELSA-2025-20655: redis security update (IMPORTANT) | 27 дней назад | |||
ELSA-2025-20654 ELSA-2025-20654: redis security update (IMPORTANT) | 27 дней назад | |||
ELSA-2025-20653 ELSA-2025-20653: valkey security update (IMPORTANT) | 27 дней назад | |||
BDU:2025-12553 Уязвимость системы управления базами данных (СУБД) Redis, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольный код | CVSS3: 9.9 | 7% Низкий | около 1 месяца назад | |
BDU:2025-01657 Уязвимость компонентов drm/amdgpu ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | больше 1 года назад |
Уязвимостей на страницу