Количество 24
Количество 24
SUSE-SU-2025:0163-1
Security update for redis
SUSE-SU-2025:0161-1
Security update for redis7
SUSE-SU-2025:0160-1
Security update for redis7
RLSA-2025:0692
Important: redis:7 security update
ELSA-2025-0692
ELSA-2025-0692: redis:7 security update (IMPORTANT)
ROS-20250114-13
Множественные уязвимости redis
CVE-2024-51741
Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem is fixed in Redis 7.2.7 and 7.4.2.
CVE-2024-51741
Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem is fixed in Redis 7.2.7 and 7.4.2.
CVE-2024-51741
Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem is fixed in Redis 7.2.7 and 7.4.2.
CVE-2024-51741
Redis allows denial-of-service due to malformed ACL selectors
CVE-2024-51741
Redis is an open source, in-memory database that persists on disk. An ...
CVE-2024-46981
Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.
CVE-2024-46981
Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.
CVE-2024-46981
Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.
CVE-2024-46981
Redis' Lua library commands may lead to remote code execution
CVE-2024-46981
Redis is an open source, in-memory database that persists on disk. An ...
BDU:2025-00449
Уязвимость системы управления базами данных Redis, связанная с недостаточной проверкой входных данных, позволяющая нарушителю вызвать отказ в обслуживании
SUSE-SU-2025:0162-1
Security update for redis
BDU:2025-00214
Уязвимость системы управления базами данных (СУБД) Redis, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольный код
SUSE-SU-2025:0081-1
Security update for redis
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
SUSE-SU-2025:0163-1 Security update for redis | около 1 года назад | |||
SUSE-SU-2025:0161-1 Security update for redis7 | около 1 года назад | |||
SUSE-SU-2025:0160-1 Security update for redis7 | около 1 года назад | |||
RLSA-2025:0692 Important: redis:7 security update | 11 месяцев назад | |||
ELSA-2025-0692 ELSA-2025-0692: redis:7 security update (IMPORTANT) | около 1 года назад | |||
ROS-20250114-13 Множественные уязвимости redis | CVSS3: 4.4 | около 1 года назад | ||
CVE-2024-51741 Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem is fixed in Redis 7.2.7 and 7.4.2. | CVSS3: 4.4 | 0% Низкий | около 1 года назад | |
CVE-2024-51741 Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem is fixed in Redis 7.2.7 and 7.4.2. | CVSS3: 4.4 | 0% Низкий | около 1 года назад | |
CVE-2024-51741 Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem is fixed in Redis 7.2.7 and 7.4.2. | CVSS3: 4.4 | 0% Низкий | около 1 года назад | |
CVE-2024-51741 Redis allows denial-of-service due to malformed ACL selectors | CVSS3: 4.4 | 0% Низкий | около 1 года назад | |
CVE-2024-51741 Redis is an open source, in-memory database that persists on disk. An ... | CVSS3: 4.4 | 0% Низкий | около 1 года назад | |
CVE-2024-46981 Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands. | CVSS3: 7 | 65% Средний | около 1 года назад | |
CVE-2024-46981 Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands. | CVSS3: 7 | 65% Средний | около 1 года назад | |
CVE-2024-46981 Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands. | CVSS3: 7 | 65% Средний | около 1 года назад | |
CVE-2024-46981 Redis' Lua library commands may lead to remote code execution | CVSS3: 7 | 65% Средний | около 1 года назад | |
CVE-2024-46981 Redis is an open source, in-memory database that persists on disk. An ... | CVSS3: 7 | 65% Средний | около 1 года назад | |
BDU:2025-00449 Уязвимость системы управления базами данных Redis, связанная с недостаточной проверкой входных данных, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 4.4 | 0% Низкий | больше 1 года назад | |
SUSE-SU-2025:0162-1 Security update for redis | 65% Средний | около 1 года назад | ||
BDU:2025-00214 Уязвимость системы управления базами данных (СУБД) Redis, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольный код | CVSS3: 7 | 65% Средний | около 1 года назад | |
SUSE-SU-2025:0081-1 Security update for redis | около 1 года назад |
Уязвимостей на страницу