Show filters
26 Total Results
Displaying 21-26 of 26
Sort by:
Attacker Value
Unknown

CVE-2018-12453

Disclosure Date: June 16, 2018 (last updated November 26, 2024)
Type confusion in the xgroupCommand function in t_stream.c in redis-server in Redis before 5.0 allows remote attackers to cause denial-of-service via an XGROUP command in which the key is not a stream.
0
Attacker Value
Unknown

CVE-2016-10517

Disclosure Date: October 24, 2017 (last updated November 26, 2024)
networking.c in Redis before 3.2.7 allows "Cross Protocol Scripting" because it lacks a check for POST and Host: strings, which are not valid in the Redis protocol (but commonly occur when an attack triggers an HTTP request to the Redis TCP port).
0
Attacker Value
Unknown

CVE-2017-15047

Disclosure Date: October 06, 2017 (last updated November 26, 2024)
The clusterLoadConfig function in cluster.c in Redis 4.0.2 allows attackers to cause a denial of service (out-of-bounds array index and application crash) or possibly have unspecified other impact by leveraging "limited access to the machine."
0
Attacker Value
Unknown

CVE-2016-8339

Disclosure Date: October 28, 2016 (last updated November 25, 2024)
A buffer overflow in Redis 3.2.x prior to 3.2.4 causes arbitrary code execution when a crafted command is sent. An out of bounds write vulnerability exists in the handling of the client-output-buffer-limit option during the CONFIG SET command for the Redis data structure store. A crafted CONFIG SET command can lead to an out of bounds write potentially resulting in code execution.
Attacker Value
Unknown

CVE-2013-7458

Disclosure Date: August 10, 2016 (last updated November 25, 2024)
linenoise, as used in Redis before 3.2.3, uses world-readable permissions for .rediscli_history, which allows local users to obtain sensitive information by reading the file.
0
Attacker Value
Unknown

CVE-2015-8080

Disclosure Date: April 13, 2016 (last updated November 25, 2024)
Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x before 2.8.24 and 3.0.x before 3.0.6 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow.