Page 3 of 41 results (0.013 seconds)

CVSS: 6.5EPSS: 0%CPEs: 7EXPL: 0

Redis is an open source, in-memory database that persists on disk. Authenticated users can use the `HINCRBYFLOAT` command to create an invalid hash field that will crash Redis on access in affected versions. This issue has been addressed in in versions 7.0.11, 6.2.12, and 6.0.19. Users are advised to upgrade. There are no known workarounds for this issue. • https://github.com/redis/redis/commit/bc7fe41e5857a0854d524e2a63a028e9394d2a5c https://github.com/redis/redis/pull/11149 https://github.com/redis/redis/security/advisories/GHSA-hjv8-vjf6-wcr6 https://lists.debian.org/debian-lts-announce/2023/04/msg00023.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EQ4DJSO4DMR55AWK6OPVJH5UTEB35R2Z https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LPUTH7NBQTZDVJWFNUD24ZCS6NDUFYS6 https://lists.fedoraproject. • CWE-20: Improper Input Validation CWE-617: Reachable Assertion •

CVSS: 3.7EPSS: 0%CPEs: 3EXPL: 0

redis-py before 4.5.3 leaves a connection open after canceling an async Redis command at an inopportune time, and can send response data to the client of an unrelated request in an off-by-one manner. NOTE: this CVE Record was initially created in response to reports about ChatGPT, and 4.3.6, 4.4.3, and 4.5.3 were released (changing the behavior for pipeline operations); however, please see CVE-2023-28859 about addressing data leakage across AsyncIO connections in general. • https://github.com/redis/redis-py/compare/v4.3.5...v4.3.6 https://github.com/redis/redis-py/compare/v4.4.2...v4.4.3 https://github.com/redis/redis-py/compare/v4.5.2...v4.5.3 https://github.com/redis/redis-py/issues/2624 https://github.com/redis/redis-py/pull/2641 https://openai.com/blog/march-20-chatgpt-outage • CWE-193: Off-by-one Error •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

redis-py before 4.4.4 and 4.5.x before 4.5.4 leaves a connection open after canceling an async Redis command at an inopportune time, and can send response data to the client of an unrelated request. (This could, for example, happen for a non-pipeline operation.) NOTE: the solutions for CVE-2023-28859 address data leakage across AsyncIO connections in general. • https://github.com/redis/redis-py/issues/2665 https://github.com/redis/redis-py/pull/2641 https://github.com/redis/redis-py/pull/2666 https://github.com/redis/redis-py/releases/tag/v4.4.4 https://github.com/redis/redis-py/releases/tag/v4.5.4 • CWE-459: Incomplete Cleanup •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

Redis is an in-memory database that persists on disk. Starting in version 7.0.8 and prior to version 7.0.10, authenticated users can use the MSETNX command to trigger a runtime assertion and termination of the Redis server process. The problem is fixed in Redis version 7.0.10. • https://github.com/redis/redis/commit/48e0d4788434833b47892fe9f3d91be7687f25c9 https://github.com/redis/redis/releases/tag/7.0.10 https://github.com/redis/redis/security/advisories/GHSA-mvmm-4vq6-vw8c https://security.netapp.com/advisory/ntap-20230413-0005 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE-617: Reachable Assertion •

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 0

Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted `SRANDMEMBER`, `ZRANDMEMBER`, and `HRANDFIELD` commands can trigger an integer overflow, resulting in a runtime assertion and termination of the Redis server process. This problem affects all Redis versions. Patches were released in Redis version(s) 6.0.18, 6.2.11 and 7.0.9. • https://github.com/redis/redis/commit/2a2a582e7cd99ba3b531336b8bd41df2b566e619 https://github.com/redis/redis/releases/tag/6.0.18 https://github.com/redis/redis/releases/tag/6.2.11 https://github.com/redis/redis/releases/tag/7.0.9 https://github.com/redis/redis/security/advisories/GHSA-x2r7-j9vw-3w83 • CWE-190: Integer Overflow or Wraparound •