Show filters
26 Total Results
Displaying 11-20 of 26
Sort by:
Attacker Value
Unknown
CVE-2020-35668
Disclosure Date: December 23, 2020 (last updated February 22, 2025)
RedisGraph 2.x through 2.2.11 has a NULL Pointer Dereference that leads to a server crash because it mishandles an unquoted string, such as an alias that has not yet been introduced.
0
Attacker Value
Unknown
CVE-2020-14147
Disclosure Date: June 15, 2020 (last updated February 21, 2025)
An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.
0
Attacker Value
Unknown
CVE-2020-7105
Disclosure Date: January 16, 2020 (last updated February 21, 2025)
async.c and dict.c in libhiredis.a in hiredis through 0.14.0 allow a NULL pointer dereference because malloc return values are unchecked.
0
Attacker Value
Unknown
CVE-2013-0178
Disclosure Date: November 01, 2019 (last updated November 27, 2024)
Insecure temporary file vulnerability in Redis before 2.6 related to /tmp/redis-%p.vm.
0
Attacker Value
Unknown
CVE-2013-0180
Disclosure Date: November 01, 2019 (last updated November 27, 2024)
Insecure temporary file vulnerability in Redis 2.6 related to /tmp/redis.ds.
0
Attacker Value
Unknown
CVE-2019-10192
Disclosure Date: July 11, 2019 (last updated November 27, 2024)
A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding to write up to 3 bytes beyond the end of a heap-allocated buffer.
0
Attacker Value
Unknown
CVE-2019-10193
Disclosure Date: July 11, 2019 (last updated November 27, 2024)
A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By corrupting a hyperloglog using the SETRANGE command, an attacker could cause Redis to perform controlled increments of up to 12 bytes past the end of a stack-allocated buffer.
0
Attacker Value
Unknown
CVE-2018-11218
Disclosure Date: June 17, 2018 (last updated November 26, 2024)
Memory Corruption was discovered in the cmsgpack library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2 because of stack-based buffer overflows.
0
Attacker Value
Unknown
CVE-2018-11219
Disclosure Date: June 17, 2018 (last updated November 26, 2024)
An Integer Overflow issue was discovered in the struct library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2, leading to a failure of bounds checking.
0
Attacker Value
Unknown
CVE-2018-12326
Disclosure Date: June 17, 2018 (last updated November 26, 2024)
Buffer overflow in redis-cli of Redis before 4.0.10 and 5.x before 5.0 RC3 allows an attacker to achieve code execution and escalate to higher privileges via a crafted command line. NOTE: It is unclear whether there are any common situations in which redis-cli is used with, for example, a -h (aka hostname) argument from an untrusted source.
0