Show filters
87 Total Results
Displaying 61-70 of 87
Sort by:
Attacker Value
Unknown
CVE-2021-3470
Disclosure Date: March 31, 2021 (last updated February 22, 2025)
A heap overflow issue was found in Redis in versions before 5.0.10, before 6.0.9 and before 6.2.0 when using a heap allocator other than jemalloc or glibc's malloc, leading to potential out of bound write or process crash. Effectively this flaw does not affect the vast majority of users, who use jemalloc or glibc malloc.
0
Attacker Value
Unknown
CVE-2021-21309
Disclosure Date: February 26, 2021 (last updated February 22, 2025)
Redis is an open-source, in-memory database that persists on disk. In affected versions of Redis an integer overflow bug in 32-bit Redis version 4.0 or newer could be exploited to corrupt the heap and potentially result with remote code execution. Redis 4.0 or newer uses a configurable limit for the maximum supported bulk input size. By default, it is 512MB which is a safe value for all platforms. If the limit is significantly increased, receiving a large request from a client may trigger several integer overflow scenarios, which would result with buffer overflow and heap corruption. We believe this could in certain conditions be exploited for remote code execution. By default, authenticated Redis users have access to all configuration parameters and can therefore use the “CONFIG SET proto-max-bulk-len” to change the safe default, making the system vulnerable. **This problem only affects 32-bit Redis (on a 32-bit system, or as a 32-bit executable running on a 64-bit system).** The pro…
0
Attacker Value
Unknown
CVE-2020-35668
Disclosure Date: December 23, 2020 (last updated February 22, 2025)
RedisGraph 2.x through 2.2.11 has a NULL Pointer Dereference that leads to a server crash because it mishandles an unquoted string, such as an alias that has not yet been introduced.
0
Attacker Value
Unknown
CVE-2020-27163
Disclosure Date: October 16, 2020 (last updated February 22, 2025)
phpRedisAdmin before 1.13.2 allows XSS via the login.php username parameter.
0
Attacker Value
Unknown
CVE-2020-14147
Disclosure Date: June 15, 2020 (last updated February 21, 2025)
An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.
0
Attacker Value
Unknown
CVE-2020-7105
Disclosure Date: January 16, 2020 (last updated February 21, 2025)
async.c and dict.c in libhiredis.a in hiredis through 0.14.0 allow a NULL pointer dereference because malloc return values are unchecked.
0
Attacker Value
Unknown
CVE-2013-0178
Disclosure Date: November 01, 2019 (last updated November 27, 2024)
Insecure temporary file vulnerability in Redis before 2.6 related to /tmp/redis-%p.vm.
0
Attacker Value
Unknown
CVE-2013-0180
Disclosure Date: November 01, 2019 (last updated November 27, 2024)
Insecure temporary file vulnerability in Redis 2.6 related to /tmp/redis.ds.
0
Attacker Value
Unknown
CVE-2019-17206
Disclosure Date: October 05, 2019 (last updated November 27, 2024)
Uncontrolled deserialization of a pickled object in models.py in Frost Ming rediswrapper (aka Redis Wrapper) before 0.3.0 allows attackers to execute arbitrary scripts.
0
Attacker Value
Unknown
CF CLI writes the client id and secret to config file
Disclosure Date: August 05, 2019 (last updated November 27, 2024)
CF CLI version prior to v6.45.0 (bosh release version 1.16.0) writes the client id and secret to its config file when the user authenticates with --client-credentials flag. A local authenticated malicious user with access to the CF CLI config file can act as that client, who is the owner of the leaked credentials.
0