Show filters
164 Total Results
Displaying 121-130 of 164
Sort by:
Attacker Value
Unknown

CVE-2019-16931

Disclosure Date: October 03, 2019 (last updated November 27, 2024)
A stored XSS vulnerability in the Visualizer plugin 3.3.0 for WordPress allows an unauthenticated attacker to execute arbitrary JavaScript when an admin or other privileged user edits the chart via the admin dashboard. This occurs because classes/Visualizer/Gutenberg/Block.php registers wp-json/visualizer/v1/update-chart with no access control, and classes/Visualizer/Render/Page/Data.php lacks output sanitization.
Attacker Value
Unknown

CVE-2019-16932

Disclosure Date: September 30, 2019 (last updated November 27, 2024)
A blind SSRF vulnerability exists in the Visualizer plugin before 3.3.1 for WordPress via wp-json/visualizer/v1/upload-data.
Attacker Value
Unknown

CVE-2019-10192

Disclosure Date: July 11, 2019 (last updated November 27, 2024)
A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding to write up to 3 bytes beyond the end of a heap-allocated buffer.
Attacker Value
Unknown

CVE-2019-10193

Disclosure Date: July 11, 2019 (last updated November 27, 2024)
A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By corrupting a hyperloglog using the SETRANGE command, an attacker could cause Redis to perform controlled increments of up to 12 bytes past the end of a stack-allocated buffer.
Attacker Value
Unknown

CVE-2018-11218

Disclosure Date: June 17, 2018 (last updated November 26, 2024)
Memory Corruption was discovered in the cmsgpack library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2 because of stack-based buffer overflows.
0
Attacker Value
Unknown

CVE-2018-11219

Disclosure Date: June 17, 2018 (last updated November 26, 2024)
An Integer Overflow issue was discovered in the struct library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2, leading to a failure of bounds checking.
0
Attacker Value
Unknown

CVE-2018-12326

Disclosure Date: June 17, 2018 (last updated November 26, 2024)
Buffer overflow in redis-cli of Redis before 4.0.10 and 5.x before 5.0 RC3 allows an attacker to achieve code execution and escalate to higher privileges via a crafted command line. NOTE: It is unclear whether there are any common situations in which redis-cli is used with, for example, a -h (aka hostname) argument from an untrusted source.
0
Attacker Value
Unknown

CVE-2018-12453

Disclosure Date: June 16, 2018 (last updated November 26, 2024)
Type confusion in the xgroupCommand function in t_stream.c in redis-server in Redis before 5.0 allows remote attackers to cause denial-of-service via an XGROUP command in which the key is not a stream.
0
Attacker Value
Unknown

CVE-2016-10517

Disclosure Date: October 24, 2017 (last updated November 26, 2024)
networking.c in Redis before 3.2.7 allows "Cross Protocol Scripting" because it lacks a check for POST and Host: strings, which are not valid in the Redis protocol (but commonly occur when an attack triggers an HTTP request to the Redis TCP port).
0
Attacker Value
Unknown

CVE-2017-15047

Disclosure Date: October 06, 2017 (last updated November 26, 2024)
The clusterLoadConfig function in cluster.c in Redis 4.0.2 allows attackers to cause a denial of service (out-of-bounds array index and application crash) or possibly have unspecified other impact by leveraging "limited access to the machine."
0