Количество 8
Количество 8
BDU:2023-02451
Уязвимость системы управления базами данных NoSQL Redis, связанная с чтением за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным
CVE-2021-32672
Redis is an open source, in-memory database that persists on disk. When using the Redis Lua Debugger, users can send malformed requests that cause the debugger’s protocol parser to read data beyond the actual buffer. This issue affects all versions of Redis with Lua debugging support (3.2 or newer). The problem is fixed in versions 6.2.6, 6.0.16 and 5.0.14.
CVE-2021-32672
Redis is an open source, in-memory database that persists on disk. When using the Redis Lua Debugger, users can send malformed requests that cause the debugger’s protocol parser to read data beyond the actual buffer. This issue affects all versions of Redis with Lua debugging support (3.2 or newer). The problem is fixed in versions 6.2.6, 6.0.16 and 5.0.14.
CVE-2021-32672
Redis is an open source, in-memory database that persists on disk. When using the Redis Lua Debugger, users can send malformed requests that cause the debugger’s protocol parser to read data beyond the actual buffer. This issue affects all versions of Redis with Lua debugging support (3.2 or newer). The problem is fixed in versions 6.2.6, 6.0.16 and 5.0.14.
CVE-2021-32672
Vulnerability in Lua Debugger in Redis
CVE-2021-32672
Redis is an open source, in-memory database that persists on disk. Whe ...
openSUSE-SU-2021:3772-1
Security update for redis
SUSE-SU-2021:3772-1
Security update for redis
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2023-02451 Уязвимость системы управления базами данных NoSQL Redis, связанная с чтением за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным | CVSS3: 4.3 | 0% Низкий | больше 4 лет назад | |
CVE-2021-32672 Redis is an open source, in-memory database that persists on disk. When using the Redis Lua Debugger, users can send malformed requests that cause the debugger’s protocol parser to read data beyond the actual buffer. This issue affects all versions of Redis with Lua debugging support (3.2 or newer). The problem is fixed in versions 6.2.6, 6.0.16 and 5.0.14. | CVSS3: 5.3 | 0% Низкий | больше 4 лет назад | |
CVE-2021-32672 Redis is an open source, in-memory database that persists on disk. When using the Redis Lua Debugger, users can send malformed requests that cause the debugger’s protocol parser to read data beyond the actual buffer. This issue affects all versions of Redis with Lua debugging support (3.2 or newer). The problem is fixed in versions 6.2.6, 6.0.16 and 5.0.14. | CVSS3: 3.1 | 0% Низкий | больше 4 лет назад | |
CVE-2021-32672 Redis is an open source, in-memory database that persists on disk. When using the Redis Lua Debugger, users can send malformed requests that cause the debugger’s protocol parser to read data beyond the actual buffer. This issue affects all versions of Redis with Lua debugging support (3.2 or newer). The problem is fixed in versions 6.2.6, 6.0.16 and 5.0.14. | CVSS3: 5.3 | 0% Низкий | больше 4 лет назад | |
CVE-2021-32672 Vulnerability in Lua Debugger in Redis | CVSS3: 4.3 | 0% Низкий | больше 4 лет назад | |
CVE-2021-32672 Redis is an open source, in-memory database that persists on disk. Whe ... | CVSS3: 5.3 | 0% Низкий | больше 4 лет назад | |
openSUSE-SU-2021:3772-1 Security update for redis | около 4 лет назад | |||
SUSE-SU-2021:3772-1 Security update for redis | около 4 лет назад |
Уязвимостей на страницу