Логотип exploitDog
bind:"CVE-2025-32023" OR bind:"CVE-2025-48367"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-32023" OR bind:"CVE-2025-48367"

Количество 22

Количество 22

suse-cvrf логотип

SUSE-SU-2025:02680-1

6 дней назад

Security update for redis

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02594-1

9 дней назад

Security update for valkey

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02593-1

9 дней назад

Security update for valkey

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02579-1

10 дней назад

Security update for redis

EPSS: Низкий
oracle-oval логотип

ELSA-2025-12006

13 дней назад

ELSA-2025-12006: redis:6 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-11453

20 дней назад

ELSA-2025-11453: redis security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02681-1

6 дней назад

Security update for redis

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02679-1

6 дней назад

Security update for redis

EPSS: Низкий
oracle-oval логотип

ELSA-2025-12008

12 дней назад

ELSA-2025-12008: redis:7 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-11401

21 день назад

ELSA-2025-11401: valkey security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2025-48367

около 1 месяца назад

Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2025-48367

около 1 месяца назад

Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2025-48367

около 1 месяца назад

Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2025-48367

13 дней назад

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2025-48367

около 1 месяца назад

Redis is an open source, in-memory database that persists on disk. An ...

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2025-32023

около 1 месяца назад

Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands.

CVSS3: 7
EPSS: Низкий
redhat логотип

CVE-2025-32023

около 1 месяца назад

Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands.

CVSS3: 8.8
EPSS: Низкий
nvd логотип

CVE-2025-32023

около 1 месяца назад

Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands.

CVSS3: 7
EPSS: Низкий
msrc логотип

CVE-2025-32023

13 дней назад

CVSS3: 7
EPSS: Низкий
debian логотип

CVE-2025-32023

около 1 месяца назад

Redis is an open source, in-memory database that persists on disk. Fro ...

CVSS3: 7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
SUSE-SU-2025:02680-1

Security update for redis

6 дней назад
suse-cvrf логотип
SUSE-SU-2025:02594-1

Security update for valkey

9 дней назад
suse-cvrf логотип
SUSE-SU-2025:02593-1

Security update for valkey

9 дней назад
suse-cvrf логотип
SUSE-SU-2025:02579-1

Security update for redis

10 дней назад
oracle-oval логотип
ELSA-2025-12006

ELSA-2025-12006: redis:6 security update (IMPORTANT)

13 дней назад
oracle-oval логотип
ELSA-2025-11453

ELSA-2025-11453: redis security update (IMPORTANT)

20 дней назад
suse-cvrf логотип
SUSE-SU-2025:02681-1

Security update for redis

6 дней назад
suse-cvrf логотип
SUSE-SU-2025:02679-1

Security update for redis

6 дней назад
oracle-oval логотип
ELSA-2025-12008

ELSA-2025-12008: redis:7 security update (IMPORTANT)

12 дней назад
oracle-oval логотип
ELSA-2025-11401

ELSA-2025-11401: valkey security update (IMPORTANT)

21 день назад
ubuntu логотип
CVE-2025-48367

Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19.

CVSS3: 7.5
0%
Низкий
около 1 месяца назад
redhat логотип
CVE-2025-48367

Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19.

CVSS3: 5.3
0%
Низкий
около 1 месяца назад
nvd логотип
CVE-2025-48367

Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19.

CVSS3: 7.5
0%
Низкий
около 1 месяца назад
msrc логотип
CVSS3: 7.5
0%
Низкий
13 дней назад
debian логотип
CVE-2025-48367

Redis is an open source, in-memory database that persists on disk. An ...

CVSS3: 7.5
0%
Низкий
около 1 месяца назад
ubuntu логотип
CVE-2025-32023

Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands.

CVSS3: 7
0%
Низкий
около 1 месяца назад
redhat логотип
CVE-2025-32023

Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands.

CVSS3: 8.8
0%
Низкий
около 1 месяца назад
nvd логотип
CVE-2025-32023

Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands.

CVSS3: 7
0%
Низкий
около 1 месяца назад
msrc логотип
CVSS3: 7
0%
Низкий
13 дней назад
debian логотип
CVE-2025-32023

Redis is an open source, in-memory database that persists on disk. Fro ...

CVSS3: 7
0%
Низкий
около 1 месяца назад

Уязвимостей на страницу