Логотип exploitDog
bind:"CVE-2025-49844" OR bind:"CVE-2025-46817" OR bind:"CVE-2025-46819" OR bind:"CVE-2025-46818"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-49844" OR bind:"CVE-2025-46817" OR bind:"CVE-2025-46819" OR bind:"CVE-2025-46818"

Количество 56

Количество 56

oracle-oval логотип

ELSA-2025-19675

2 месяца назад

ELSA-2025-19675: valkey security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-19345

3 месяца назад

ELSA-2025-19345: redis:7 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-19238

3 месяца назад

ELSA-2025-19238: redis:6 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-19237

3 месяца назад

ELSA-2025-19237: redis security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2025:20121-1

около 2 месяцев назад

Security update for redis

EPSS: Низкий
redos логотип

ROS-20251029-06

3 месяца назад

Множественные уязвимости redis

CVSS3: 9.9
EPSS: Низкий
ubuntu логотип

CVE-2025-49844

3 месяца назад

Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.

CVSS3: 9.9
EPSS: Низкий
nvd логотип

CVE-2025-49844

3 месяца назад

Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.

CVSS3: 9.9
EPSS: Низкий
msrc логотип

CVE-2025-49844

3 месяца назад

Redis Lua Use-After-Free may lead to remote code execution

CVSS3: 9.9
EPSS: Низкий
debian логотип

CVE-2025-49844

3 месяца назад

Redis is an open source, in-memory database that persists on disk. Ver ...

CVSS3: 9.9
EPSS: Низкий
oracle-oval логотип

ELSA-2025-20656

3 месяца назад

ELSA-2025-20656: redis security update (CRITICAL)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-20655

3 месяца назад

ELSA-2025-20655: redis security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-20654

3 месяца назад

ELSA-2025-20654: redis security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-20653

3 месяца назад

ELSA-2025-20653: valkey security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2025-12553

4 месяца назад

Уязвимость системы управления базами данных (СУБД) Redis, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.9
EPSS: Низкий
redos логотип

ROS-20251217-7321

около 1 месяца назад

Уязвимость valkey

CVSS3: 9.9
EPSS: Низкий
redos логотип

ROS-20251124-05

около 2 месяцев назад

Уязвимость redis

CVSS3: 9.9
EPSS: Низкий
ubuntu логотип

CVE-2025-46817

3 месяца назад

Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to cause an integer overflow and potentially lead to remote code execution The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2.

CVSS3: 7
EPSS: Средний
nvd логотип

CVE-2025-46817

3 месяца назад

Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to cause an integer overflow and potentially lead to remote code execution The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2.

CVSS3: 7
EPSS: Средний
msrc логотип

CVE-2025-46817

3 месяца назад

Lua library commands may lead to integer overflow and potential RCE

CVSS3: 7
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2025-19675

ELSA-2025-19675: valkey security update (IMPORTANT)

2 месяца назад
oracle-oval логотип
ELSA-2025-19345

ELSA-2025-19345: redis:7 security update (IMPORTANT)

3 месяца назад
oracle-oval логотип
ELSA-2025-19238

ELSA-2025-19238: redis:6 security update (IMPORTANT)

3 месяца назад
oracle-oval логотип
ELSA-2025-19237

ELSA-2025-19237: redis security update (IMPORTANT)

3 месяца назад
suse-cvrf логотип
openSUSE-SU-2025:20121-1

Security update for redis

около 2 месяцев назад
redos логотип
ROS-20251029-06

Множественные уязвимости redis

CVSS3: 9.9
3 месяца назад
ubuntu логотип
CVE-2025-49844

Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.

CVSS3: 9.9
7%
Низкий
3 месяца назад
nvd логотип
CVE-2025-49844

Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.

CVSS3: 9.9
7%
Низкий
3 месяца назад
msrc логотип
CVE-2025-49844

Redis Lua Use-After-Free may lead to remote code execution

CVSS3: 9.9
7%
Низкий
3 месяца назад
debian логотип
CVE-2025-49844

Redis is an open source, in-memory database that persists on disk. Ver ...

CVSS3: 9.9
7%
Низкий
3 месяца назад
oracle-oval логотип
ELSA-2025-20656

ELSA-2025-20656: redis security update (CRITICAL)

3 месяца назад
oracle-oval логотип
ELSA-2025-20655

ELSA-2025-20655: redis security update (IMPORTANT)

3 месяца назад
oracle-oval логотип
ELSA-2025-20654

ELSA-2025-20654: redis security update (IMPORTANT)

3 месяца назад
oracle-oval логотип
ELSA-2025-20653

ELSA-2025-20653: valkey security update (IMPORTANT)

3 месяца назад
fstec логотип
BDU:2025-12553

Уязвимость системы управления базами данных (СУБД) Redis, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.9
7%
Низкий
4 месяца назад
redos логотип
ROS-20251217-7321

Уязвимость valkey

CVSS3: 9.9
7%
Низкий
около 1 месяца назад
redos логотип
ROS-20251124-05

Уязвимость redis

CVSS3: 9.9
7%
Низкий
около 2 месяцев назад
ubuntu логотип
CVE-2025-46817

Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to cause an integer overflow and potentially lead to remote code execution The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2.

CVSS3: 7
23%
Средний
3 месяца назад
nvd логотип
CVE-2025-46817

Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to cause an integer overflow and potentially lead to remote code execution The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2.

CVSS3: 7
23%
Средний
3 месяца назад
msrc логотип
CVE-2025-46817

Lua library commands may lead to integer overflow and potential RCE

CVSS3: 7
23%
Средний
3 месяца назад

Уязвимостей на страницу