Логотип exploitDog
bind:"CVE-2025-49844" OR bind:"CVE-2025-46817" OR bind:"CVE-2025-46819" OR bind:"CVE-2025-46818"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-49844" OR bind:"CVE-2025-46817" OR bind:"CVE-2025-46819" OR bind:"CVE-2025-46818"

Количество 56

Количество 56

debian логотип

CVE-2025-46817

3 месяца назад

Redis is an open source, in-memory database that persists on disk. Ver ...

CVSS3: 7
EPSS: Средний
fstec логотип

BDU:2025-12820

4 месяца назад

Уязвимость системы управления базами данных (СУБД) Redis, связанная с целочисленным переполнением, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Средний
redos логотип

ROS-20251217-7322

около 1 месяца назад

Уязвимость valkey

CVSS3: 9.8
EPSS: Средний
fstec логотип

BDU:2025-01671

больше 1 года назад

Уязвимость компонентов drm/amd/display ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
EPSS: Низкий
ubuntu логотип

CVE-2025-46819

3 месяца назад

Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted LUA script to read out-of-bound data or crash the server and subsequent denial of service. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families.

CVSS3: 6.3
EPSS: Низкий
nvd логотип

CVE-2025-46819

3 месяца назад

Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted LUA script to read out-of-bound data or crash the server and subsequent denial of service. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families.

CVSS3: 6.3
EPSS: Низкий
msrc логотип

CVE-2025-46819

3 месяца назад

Redis is vulnerable to DoS via specially crafted LUA scripts

CVSS3: 6.3
EPSS: Низкий
debian логотип

CVE-2025-46819

3 месяца назад

Redis is an open source, in-memory database that persists on disk. Ver ...

CVSS3: 6.3
EPSS: Низкий
ubuntu логотип

CVE-2025-46818

3 месяца назад

Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user. The problem exists in all versions of Redis with LUA scripting. This issue is fixed in version 8.2.2. A workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing LUA scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families.

CVSS3: 6
EPSS: Низкий
nvd логотип

CVE-2025-46818

3 месяца назад

Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user. The problem exists in all versions of Redis with LUA scripting. This issue is fixed in version 8.2.2. A workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing LUA scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families.

CVSS3: 6
EPSS: Низкий
msrc логотип

CVE-2025-46818

около 1 месяца назад

Redis: Authenticated users can execute LUA scripts as a different user

CVSS3: 6
EPSS: Низкий
debian логотип

CVE-2025-46818

3 месяца назад

Redis is an open source, in-memory database that persists on disk. Ver ...

CVSS3: 6
EPSS: Низкий
redos логотип

ROS-20251217-7324

около 1 месяца назад

Уязвимость valkey

CVSS3: 7.1
EPSS: Низкий
fstec логотип

BDU:2025-12557

4 месяца назад

Уязвимость системы управления базами данных (СУБД) Redis, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный код

CVSS3: 6
EPSS: Низкий
redos логотип

ROS-20251217-7323

около 1 месяца назад

Уязвимость valkey

CVSS3: 6
EPSS: Низкий
fstec логотип

BDU:2025-01657

больше 1 года назад

Уязвимость компонентов drm/amdgpu ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
debian логотип
CVE-2025-46817

Redis is an open source, in-memory database that persists on disk. Ver ...

CVSS3: 7
23%
Средний
3 месяца назад
fstec логотип
BDU:2025-12820

Уязвимость системы управления базами данных (СУБД) Redis, связанная с целочисленным переполнением, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
23%
Средний
4 месяца назад
redos логотип
ROS-20251217-7322

Уязвимость valkey

CVSS3: 9.8
23%
Средний
около 1 месяца назад
fstec логотип
BDU:2025-01671

Уязвимость компонентов drm/amd/display ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
0%
Низкий
больше 1 года назад
ubuntu логотип
CVE-2025-46819

Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted LUA script to read out-of-bound data or crash the server and subsequent denial of service. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families.

CVSS3: 6.3
6%
Низкий
3 месяца назад
nvd логотип
CVE-2025-46819

Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted LUA script to read out-of-bound data or crash the server and subsequent denial of service. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families.

CVSS3: 6.3
6%
Низкий
3 месяца назад
msrc логотип
CVE-2025-46819

Redis is vulnerable to DoS via specially crafted LUA scripts

CVSS3: 6.3
6%
Низкий
3 месяца назад
debian логотип
CVE-2025-46819

Redis is an open source, in-memory database that persists on disk. Ver ...

CVSS3: 6.3
6%
Низкий
3 месяца назад
ubuntu логотип
CVE-2025-46818

Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user. The problem exists in all versions of Redis with LUA scripting. This issue is fixed in version 8.2.2. A workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing LUA scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families.

CVSS3: 6
5%
Низкий
3 месяца назад
nvd логотип
CVE-2025-46818

Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user. The problem exists in all versions of Redis with LUA scripting. This issue is fixed in version 8.2.2. A workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing LUA scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families.

CVSS3: 6
5%
Низкий
3 месяца назад
msrc логотип
CVE-2025-46818

Redis: Authenticated users can execute LUA scripts as a different user

CVSS3: 6
5%
Низкий
около 1 месяца назад
debian логотип
CVE-2025-46818

Redis is an open source, in-memory database that persists on disk. Ver ...

CVSS3: 6
5%
Низкий
3 месяца назад
redos логотип
ROS-20251217-7324

Уязвимость valkey

CVSS3: 7.1
6%
Низкий
около 1 месяца назад
fstec логотип
BDU:2025-12557

Уязвимость системы управления базами данных (СУБД) Redis, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный код

CVSS3: 6
5%
Низкий
4 месяца назад
redos логотип
ROS-20251217-7323

Уязвимость valkey

CVSS3: 6
5%
Низкий
около 1 месяца назад
fstec логотип
BDU:2025-01657

Уязвимость компонентов drm/amdgpu ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
0%
Низкий
больше 1 года назад

Уязвимостей на страницу