Логотип exploitDog
bind:"CVE-2015-8080"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2015-8080"

Количество 7

Количество 7

ubuntu логотип

CVE-2015-8080

почти 10 лет назад

Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x before 2.8.24 and 3.0.x before 3.0.6 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2015-8080

больше 10 лет назад

Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x before 2.8.24 and 3.0.x before 3.0.6 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow.

CVSS2: 6.5
EPSS: Низкий
nvd логотип

CVE-2015-8080

почти 10 лет назад

Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x before 2.8.24 and 3.0.x before 3.0.6 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2015-8080

почти 10 лет назад

Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x ...

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2016:1444-1

больше 9 лет назад

Security update for redis

EPSS: Низкий
github логотип

GHSA-4r9x-2fwv-q8g6

больше 3 лет назад

Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x before 2.8.24 and 3.0.x before 3.0.6 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow.

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-OU-2020:3291-1

около 5 лет назад

Optional update for python-redis and redis

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2015-8080

Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x before 2.8.24 and 3.0.x before 3.0.6 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow.

CVSS3: 7.5
2%
Низкий
почти 10 лет назад
redhat логотип
CVE-2015-8080

Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x before 2.8.24 and 3.0.x before 3.0.6 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow.

CVSS2: 6.5
2%
Низкий
больше 10 лет назад
nvd логотип
CVE-2015-8080

Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x before 2.8.24 and 3.0.x before 3.0.6 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow.

CVSS3: 7.5
2%
Низкий
почти 10 лет назад
debian логотип
CVE-2015-8080

Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x ...

CVSS3: 7.5
2%
Низкий
почти 10 лет назад
suse-cvrf логотип
openSUSE-SU-2016:1444-1

Security update for redis

2%
Низкий
больше 9 лет назад
github логотип
GHSA-4r9x-2fwv-q8g6

Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x before 2.8.24 and 3.0.x before 3.0.6 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow.

CVSS3: 7.5
2%
Низкий
больше 3 лет назад
suse-cvrf логотип
SUSE-OU-2020:3291-1

Optional update for python-redis and redis

около 5 лет назад

Уязвимостей на страницу