Логотип exploitDog
bind:"CVE-2025-46817" OR bind:"CVE-2025-46819" OR bind:"CVE-2025-49844" OR bind:"CVE-2025-46818"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-46817" OR bind:"CVE-2025-46819" OR bind:"CVE-2025-49844" OR bind:"CVE-2025-46818"

Количество 60

Количество 60

fstec логотип

BDU:2025-01657

почти 2 года назад

Уязвимость компонентов drm/amdgpu ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
EPSS: Низкий
ubuntu логотип

CVE-2025-46818

6 месяцев назад

Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user. The problem exists in all versions of Redis with LUA scripting. This issue is fixed in version 8.2.2. A workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing LUA scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families.

CVSS3: 6
EPSS: Низкий
redhat логотип

CVE-2025-46818

6 месяцев назад

Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user. The problem exists in all versions of Redis with LUA scripting. This issue is fixed in version 8.2.2. A workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing LUA scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families.

CVSS3: 6
EPSS: Низкий
nvd логотип

CVE-2025-46818

6 месяцев назад

Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user. The problem exists in all versions of Redis with LUA scripting. This issue is fixed in version 8.2.2. A workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing LUA scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families.

CVSS3: 6
EPSS: Низкий
msrc логотип

CVE-2025-46818

4 месяца назад

Redis: Authenticated users can execute LUA scripts as a different user

CVSS3: 6
EPSS: Низкий
debian логотип

CVE-2025-46818

6 месяцев назад

Redis is an open source, in-memory database that persists on disk. Ver ...

CVSS3: 6
EPSS: Низкий
ubuntu логотип

CVE-2025-49844

6 месяцев назад

Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.

CVSS3: 9.9
EPSS: Средний
redhat логотип

CVE-2025-49844

6 месяцев назад

Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.

CVSS3: 8.8
EPSS: Средний
nvd логотип

CVE-2025-49844

6 месяцев назад

Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.

CVSS3: 9.9
EPSS: Средний
msrc логотип

CVE-2025-49844

6 месяцев назад

Redis Lua Use-After-Free may lead to remote code execution

CVSS3: 9.9
EPSS: Средний
debian логотип

CVE-2025-49844

6 месяцев назад

Redis is an open source, in-memory database that persists on disk. Ver ...

CVSS3: 9.9
EPSS: Средний
fstec логотип

BDU:2025-12557

6 месяцев назад

Уязвимость системы управления базами данных (СУБД) Redis, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный код

CVSS3: 6
EPSS: Низкий
oracle-oval логотип

ELSA-2025-20656

6 месяцев назад

ELSA-2025-20656: redis security update (CRITICAL)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-20655

6 месяцев назад

ELSA-2025-20655: redis security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-20654

6 месяцев назад

ELSA-2025-20654: redis security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-20653

6 месяцев назад

ELSA-2025-20653: valkey security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2025-12553

6 месяцев назад

Уязвимость системы управления базами данных (СУБД) Redis, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.9
EPSS: Средний
redos логотип

ROS-20251217-7323

4 месяца назад

Уязвимость valkey

CVSS3: 6
EPSS: Низкий
redos логотип

ROS-20251217-7321

4 месяца назад

Уязвимость valkey

CVSS3: 9.9
EPSS: Средний
redos логотип

ROS-20251124-05

4 месяца назад

Уязвимость redis

CVSS3: 9.9
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2025-01657

Уязвимость компонентов drm/amdgpu ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
0%
Низкий
почти 2 года назад
ubuntu логотип
CVE-2025-46818

Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user. The problem exists in all versions of Redis with LUA scripting. This issue is fixed in version 8.2.2. A workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing LUA scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families.

CVSS3: 6
3%
Низкий
6 месяцев назад
redhat логотип
CVE-2025-46818

Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user. The problem exists in all versions of Redis with LUA scripting. This issue is fixed in version 8.2.2. A workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing LUA scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families.

CVSS3: 6
3%
Низкий
6 месяцев назад
nvd логотип
CVE-2025-46818

Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user. The problem exists in all versions of Redis with LUA scripting. This issue is fixed in version 8.2.2. A workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing LUA scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families.

CVSS3: 6
3%
Низкий
6 месяцев назад
msrc логотип
CVE-2025-46818

Redis: Authenticated users can execute LUA scripts as a different user

CVSS3: 6
3%
Низкий
4 месяца назад
debian логотип
CVE-2025-46818

Redis is an open source, in-memory database that persists on disk. Ver ...

CVSS3: 6
3%
Низкий
6 месяцев назад
ubuntu логотип
CVE-2025-49844

Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.

CVSS3: 9.9
12%
Средний
6 месяцев назад
redhat логотип
CVE-2025-49844

Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.

CVSS3: 8.8
12%
Средний
6 месяцев назад
nvd логотип
CVE-2025-49844

Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.

CVSS3: 9.9
12%
Средний
6 месяцев назад
msrc логотип
CVE-2025-49844

Redis Lua Use-After-Free may lead to remote code execution

CVSS3: 9.9
12%
Средний
6 месяцев назад
debian логотип
CVE-2025-49844

Redis is an open source, in-memory database that persists on disk. Ver ...

CVSS3: 9.9
12%
Средний
6 месяцев назад
fstec логотип
BDU:2025-12557

Уязвимость системы управления базами данных (СУБД) Redis, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный код

CVSS3: 6
3%
Низкий
6 месяцев назад
oracle-oval логотип
ELSA-2025-20656

ELSA-2025-20656: redis security update (CRITICAL)

6 месяцев назад
oracle-oval логотип
ELSA-2025-20655

ELSA-2025-20655: redis security update (IMPORTANT)

6 месяцев назад
oracle-oval логотип
ELSA-2025-20654

ELSA-2025-20654: redis security update (IMPORTANT)

6 месяцев назад
oracle-oval логотип
ELSA-2025-20653

ELSA-2025-20653: valkey security update (IMPORTANT)

6 месяцев назад
fstec логотип
BDU:2025-12553

Уязвимость системы управления базами данных (СУБД) Redis, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.9
12%
Средний
6 месяцев назад
redos логотип
ROS-20251217-7323

Уязвимость valkey

CVSS3: 6
3%
Низкий
4 месяца назад
redos логотип
ROS-20251217-7321

Уязвимость valkey

CVSS3: 9.9
12%
Средний
4 месяца назад
redos логотип
ROS-20251124-05

Уязвимость redis

CVSS3: 9.9
12%
Средний
4 месяца назад

Уязвимостей на страницу