Show filters
87 Total Results
Displaying 71-80 of 87
Sort by:
Attacker Value
Unknown

CVE-2019-10192

Disclosure Date: July 11, 2019 (last updated November 27, 2024)
A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding to write up to 3 bytes beyond the end of a heap-allocated buffer.
Attacker Value
Unknown

CVE-2019-10193

Disclosure Date: July 11, 2019 (last updated November 27, 2024)
A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By corrupting a hyperloglog using the SETRANGE command, an attacker could cause Redis to perform controlled increments of up to 12 bytes past the end of a stack-allocated buffer.
Attacker Value
Unknown

CVE-2018-11218

Disclosure Date: June 17, 2018 (last updated November 26, 2024)
Memory Corruption was discovered in the cmsgpack library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2 because of stack-based buffer overflows.
0
Attacker Value
Unknown

CVE-2018-11219

Disclosure Date: June 17, 2018 (last updated November 26, 2024)
An Integer Overflow issue was discovered in the struct library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2, leading to a failure of bounds checking.
0
Attacker Value
Unknown

CVE-2018-12326

Disclosure Date: June 17, 2018 (last updated November 26, 2024)
Buffer overflow in redis-cli of Redis before 4.0.10 and 5.x before 5.0 RC3 allows an attacker to achieve code execution and escalate to higher privileges via a crafted command line. NOTE: It is unclear whether there are any common situations in which redis-cli is used with, for example, a -h (aka hostname) argument from an untrusted source.
0
Attacker Value
Unknown

CVE-2018-12453

Disclosure Date: June 16, 2018 (last updated November 26, 2024)
Type confusion in the xgroupCommand function in t_stream.c in redis-server in Redis before 5.0 allows remote attackers to cause denial-of-service via an XGROUP command in which the key is not a stream.
0
Attacker Value
Unknown

CVE-2016-10672

Disclosure Date: June 04, 2018 (last updated November 26, 2024)
cloudpub-redis is a module for CloudPub: Redis Backend cloudpub-redis downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server.
0
Attacker Value
Unknown

CVE-2016-10639

Disclosure Date: June 04, 2018 (last updated November 26, 2024)
redis-srvr is a npm wrapper for redis-server. redis-srvr downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server.
0
Attacker Value
Unknown

CVE-2017-1000248

Disclosure Date: November 17, 2017 (last updated November 26, 2024)
Redis-store <=v1.3.0 allows unsafe objects to be loaded from redis
0
Attacker Value
Unknown

CVE-2016-10517

Disclosure Date: October 24, 2017 (last updated November 26, 2024)
networking.c in Redis before 3.2.7 allows "Cross Protocol Scripting" because it lacks a check for POST and Host: strings, which are not valid in the Redis protocol (but commonly occur when an attack triggers an HTTP request to the Redis TCP port).
0