Total vulnerabilities in the database
An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.
Software | From | Fixed in |
---|---|---|
redislabs / redis | - | 5.0.9 |
redislabs / redis | 6.0.0 | 6.0.3 |
oracle / communications_operations_monitor | 3.4 | 3.4.x |
oracle / communications_operations_monitor | 4.2 | 4.2.x |
oracle / communications_operations_monitor | 4.1 | 4.1.x |
oracle / communications_operations_monitor | 4.3 | 4.3.x |
suse / linux_enterprise | 12.0 | 12.0.x |
debian / debian_linux | 10.0 | 10.0.x |