Количество 21
Количество 21

SUSE-SU-2025:0163-1
Security update for redis

SUSE-SU-2025:0161-1
Security update for redis7

SUSE-SU-2025:0160-1
Security update for redis7
ELSA-2025-0692
ELSA-2025-0692: redis:7 security update (IMPORTANT)

ROS-20250114-13
Множественные уязвимости redis

CVE-2024-51741
Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem is fixed in Redis 7.2.7 and 7.4.2.

CVE-2024-51741
Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem is fixed in Redis 7.2.7 and 7.4.2.

CVE-2024-51741
Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem is fixed in Redis 7.2.7 and 7.4.2.

CVE-2024-51741
CVE-2024-51741
Redis is an open source, in-memory database that persists on disk. An ...

CVE-2024-46981
Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.

CVE-2024-46981
Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.

CVE-2024-46981
Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.

CVE-2024-46981
CVE-2024-46981
Redis is an open source, in-memory database that persists on disk. An ...

BDU:2025-00449
Уязвимость системы управления базами данных Redis, связанная с недостаточной проверкой входных данных, позволяющая нарушителю вызвать отказ в обслуживании

SUSE-SU-2025:0162-1
Security update for redis

BDU:2025-00214
Уязвимость системы управления базами данных (СУБД) Redis, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольный код

SUSE-SU-2025:0081-1
Security update for redis
ELSA-2025-0693
ELSA-2025-0693: redis security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | SUSE-SU-2025:0163-1 Security update for redis | 7 месяцев назад | ||
![]() | SUSE-SU-2025:0161-1 Security update for redis7 | 7 месяцев назад | ||
![]() | SUSE-SU-2025:0160-1 Security update for redis7 | 7 месяцев назад | ||
ELSA-2025-0692 ELSA-2025-0692: redis:7 security update (IMPORTANT) | 7 месяцев назад | |||
![]() | ROS-20250114-13 Множественные уязвимости redis | CVSS3: 4.4 | 7 месяцев назад | |
![]() | CVE-2024-51741 Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem is fixed in Redis 7.2.7 and 7.4.2. | CVSS3: 4.4 | 0% Низкий | 7 месяцев назад |
![]() | CVE-2024-51741 Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem is fixed in Redis 7.2.7 and 7.4.2. | CVSS3: 4.4 | 0% Низкий | 7 месяцев назад |
![]() | CVE-2024-51741 Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem is fixed in Redis 7.2.7 and 7.4.2. | CVSS3: 4.4 | 0% Низкий | 7 месяцев назад |
![]() | CVSS3: 4.4 | 0% Низкий | 7 месяцев назад | |
CVE-2024-51741 Redis is an open source, in-memory database that persists on disk. An ... | CVSS3: 4.4 | 0% Низкий | 7 месяцев назад | |
![]() | CVE-2024-46981 Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands. | CVSS3: 7 | 69% Средний | 7 месяцев назад |
![]() | CVE-2024-46981 Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands. | CVSS3: 7 | 69% Средний | 7 месяцев назад |
![]() | CVE-2024-46981 Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands. | CVSS3: 7 | 69% Средний | 7 месяцев назад |
![]() | CVSS3: 7 | 69% Средний | 7 месяцев назад | |
CVE-2024-46981 Redis is an open source, in-memory database that persists on disk. An ... | CVSS3: 7 | 69% Средний | 7 месяцев назад | |
![]() | BDU:2025-00449 Уязвимость системы управления базами данных Redis, связанная с недостаточной проверкой входных данных, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 4.4 | 0% Низкий | 10 месяцев назад |
![]() | SUSE-SU-2025:0162-1 Security update for redis | 69% Средний | 7 месяцев назад | |
![]() | BDU:2025-00214 Уязвимость системы управления базами данных (СУБД) Redis, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольный код | CVSS3: 7 | 69% Средний | 7 месяцев назад |
![]() | SUSE-SU-2025:0081-1 Security update for redis | 7 месяцев назад | ||
ELSA-2025-0693 ELSA-2025-0693: redis security update (IMPORTANT) | 7 месяцев назад |
Уязвимостей на страницу