Логотип exploitDog
bind:"CVE-2025-32023"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-32023"

Количество 23

Количество 23

ubuntu логотип

CVE-2025-32023

6 месяцев назад

Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands.

CVSS3: 7
EPSS: Низкий
redhat логотип

CVE-2025-32023

6 месяцев назад

Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands.

CVSS3: 8.8
EPSS: Низкий
nvd логотип

CVE-2025-32023

6 месяцев назад

Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands.

CVSS3: 7
EPSS: Низкий
msrc логотип

CVE-2025-32023

5 месяцев назад

Redis allows out of bounds writes in hyperloglog commands leading to RCE

CVSS3: 7
EPSS: Низкий
debian логотип

CVE-2025-32023

6 месяцев назад

Redis is an open source, in-memory database that persists on disk. Fro ...

CVSS3: 7
EPSS: Низкий
fstec логотип

BDU:2025-08113

6 месяцев назад

Уязвимость сервера системы управления базами данных (СУБД) Redis, позволяющая нарушителю выполнить произвольный код

CVSS3: 7
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03073-1

4 месяца назад

Security update for redis

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02680-1

5 месяцев назад

Security update for redis

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02594-1

5 месяцев назад

Security update for valkey

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02593-1

5 месяцев назад

Security update for valkey

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02579-1

5 месяцев назад

Security update for redis

EPSS: Низкий
redos логотип

ROS-20250904-11

4 месяца назад

Уязвимость valkey

CVSS2: 6
EPSS: Низкий
rocky логотип

RLSA-2025:12006

5 месяцев назад

Important: redis:6 security update

EPSS: Низкий
rocky логотип

RLSA-2025:11453

3 месяца назад

Important: redis security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-12006

5 месяцев назад

ELSA-2025-12006: redis:6 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-11453

5 месяцев назад

ELSA-2025-11453: redis security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02681-1

5 месяцев назад

Security update for redis

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02679-1

5 месяцев назад

Security update for redis

EPSS: Низкий
rocky логотип

RLSA-2025:12008

3 месяца назад

Important: redis:7 security update

EPSS: Низкий
rocky логотип

RLSA-2025:11401

3 месяца назад

Important: valkey security update

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-32023

Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands.

CVSS3: 7
0%
Низкий
6 месяцев назад
redhat логотип
CVE-2025-32023

Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands.

CVSS3: 8.8
0%
Низкий
6 месяцев назад
nvd логотип
CVE-2025-32023

Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands.

CVSS3: 7
0%
Низкий
6 месяцев назад
msrc логотип
CVE-2025-32023

Redis allows out of bounds writes in hyperloglog commands leading to RCE

CVSS3: 7
0%
Низкий
5 месяцев назад
debian логотип
CVE-2025-32023

Redis is an open source, in-memory database that persists on disk. Fro ...

CVSS3: 7
0%
Низкий
6 месяцев назад
fstec логотип
BDU:2025-08113

Уязвимость сервера системы управления базами данных (СУБД) Redis, позволяющая нарушителю выполнить произвольный код

CVSS3: 7
0%
Низкий
6 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03073-1

Security update for redis

4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02680-1

Security update for redis

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02594-1

Security update for valkey

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02593-1

Security update for valkey

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02579-1

Security update for redis

5 месяцев назад
redos логотип
ROS-20250904-11

Уязвимость valkey

CVSS2: 6
0%
Низкий
4 месяца назад
rocky логотип
RLSA-2025:12006

Important: redis:6 security update

5 месяцев назад
rocky логотип
RLSA-2025:11453

Important: redis security update

3 месяца назад
oracle-oval логотип
ELSA-2025-12006

ELSA-2025-12006: redis:6 security update (IMPORTANT)

5 месяцев назад
oracle-oval логотип
ELSA-2025-11453

ELSA-2025-11453: redis security update (IMPORTANT)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02681-1

Security update for redis

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02679-1

Security update for redis

5 месяцев назад
rocky логотип
RLSA-2025:12008

Important: redis:7 security update

3 месяца назад
rocky логотип
RLSA-2025:11401

Important: valkey security update

3 месяца назад

Уязвимостей на страницу