Redis Lua Use-After-Free may lead to remote code execution
Redis 7.2
Redis vulnerable to integer overflow in certain payloads
redis-server RESTORE invalid memory access may allow remote code execution
redis-server use-after-free in unblock client flow may allow remote code execution
Redis DoS Vulnerability due to bad connection error handling
Redis DoS Vulnerability due to unlimited growth of output buffers abused by unauthenticated client
Redis allows out of bounds writes in hyperloglog commands leading to RCE
Lua library commands may lead to integer overflow and potential RCE
Redis' Lua library commands may lead to remote code execution
Lua library commands may lead to stack overflow and RCE in Redis
Redis is vulnerable to DoS via specially crafted LUA scripts
redis-server Lua use-after-free may allow remote code execution
Redis: Authenticated users can execute LUA scripts as a different user
Denial-of-service due to unbounded pattern matching in Redis
redis-check-aof may lead to stack overflow and potential RCE
Denial-of-service due to malformed ACL selectors in Redis
Redis allows denial-of-service due to malformed ACL selectors
Redis Unix-domain socket may have be exposed with the wrong permissions for a short time window.
Redis SORT_RO may bypass ACL configuration