Количество 17
Количество 17
BDU:2024-07792
Уязвимость системы управления базами данных (СУБД) Redis, связанная с переполнением буфера в стеке, позволяющая нарушителю выполнить произвольный код
ROS-20241017-05
Множественные уязвимости redis
CVE-2024-31449
Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2024-31449
Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2024-31449
Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2024-31449
CVE-2024-31449
Redis is an open source, in-memory database that persists on disk. An ...
SUSE-SU-2024:3575-1
Security update for redis
SUSE-SU-2025:0081-1
Security update for redis
SUSE-SU-2024:3549-1
Security update for redis7
SUSE-SU-2024:3537-1
Security update for redis7
SUSE-SU-2024:3535-1
Security update for redis
RLSA-2025:0693
Important: redis security update
ELSA-2025-0693
ELSA-2025-0693: redis security update (IMPORTANT)
ELSA-2024-10869
ELSA-2024-10869: redis:7 security update (MODERATE)
RLSA-2025:0595
Important: redis:6 security update
ELSA-2025-0595
ELSA-2025-0595: redis:6 security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2024-07792 Уязвимость системы управления базами данных (СУБД) Redis, связанная с переполнением буфера в стеке, позволяющая нарушителю выполнить произвольный код | CVSS3: 8.8 | 58% Средний | больше 1 года назад | |
ROS-20241017-05 Множественные уязвимости redis | CVSS3: 8.8 | около 1 года назад | ||
CVE-2024-31449 Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. | CVSS3: 7 | 58% Средний | больше 1 года назад | |
CVE-2024-31449 Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. | CVSS3: 7 | 58% Средний | больше 1 года назад | |
CVE-2024-31449 Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. | CVSS3: 7 | 58% Средний | больше 1 года назад | |
CVSS3: 7 | 58% Средний | около 1 года назад | ||
CVE-2024-31449 Redis is an open source, in-memory database that persists on disk. An ... | CVSS3: 7 | 58% Средний | больше 1 года назад | |
SUSE-SU-2024:3575-1 Security update for redis | больше 1 года назад | |||
SUSE-SU-2025:0081-1 Security update for redis | 12 месяцев назад | |||
SUSE-SU-2024:3549-1 Security update for redis7 | больше 1 года назад | |||
SUSE-SU-2024:3537-1 Security update for redis7 | больше 1 года назад | |||
SUSE-SU-2024:3535-1 Security update for redis | больше 1 года назад | |||
RLSA-2025:0693 Important: redis security update | 10 месяцев назад | |||
ELSA-2025-0693 ELSA-2025-0693: redis security update (IMPORTANT) | 12 месяцев назад | |||
ELSA-2024-10869 ELSA-2024-10869: redis:7 security update (MODERATE) | около 1 года назад | |||
RLSA-2025:0595 Important: redis:6 security update | 11 месяцев назад | |||
ELSA-2025-0595 ELSA-2025-0595: redis:6 security update (IMPORTANT) | 12 месяцев назад |
Уязвимостей на страницу