redis vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the redis package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Use After Free

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Stack-based Buffer Overflow

*
  • L
Uncontrolled Recursion

*
  • H
Integer Overflow or Wraparound

<5:7.0.15-1~deb12u1
  • L
Exposure of Resource to Wrong Sphere

<5:7.0.15-1~deb12u1
  • L
Improper Privilege Management

<5:7.0.15-1~deb12u1
  • M
Reachable Assertion

<5:7.0.1-4
  • H
Heap-based Buffer Overflow

<5:7.0.15-1~deb12u1
  • H
Heap-based Buffer Overflow

<5:7.0.15-1~deb12u1
  • M
Reachable Assertion

<5:7.0.11-1
  • M
Arbitrary Command Injection

<5:7.0.10-1
  • M
Algorithmic Complexity

<5:7.0.9-1
  • M
Integer Overflow or Wraparound

<5:7.0.9-1
  • M
Integer Overflow or Wraparound

<5:7.0.8-1
  • M
Integer Overflow or Wraparound

<5:7.0.8-1
  • L
Improper Resource Shutdown or Release

*
  • C
Integer Overflow or Wraparound

<5:7.0.5-1
  • H
Heap-based Buffer Overflow

<5:7.0.4-1
  • H
Arbitrary Code Injection

<5:7.0.1-4
  • M
NULL Pointer Dereference

<5:7.0.1-4
  • C
Missing Authorization

<5:6.0.16-2
  • H
Allocation of Resources Without Limits or Throttling

<5:6.0.16-1
  • M
Out-of-bounds Read

<5:6.0.16-1
  • H
Integer Overflow or Wraparound

<5:6.0.16-1
  • H
Integer Overflow or Wraparound

<5:6.0.16-1
  • H
Integer Overflow or Wraparound

<5:6.0.16-1
  • H
Integer Overflow or Wraparound

<5:6.0.16-1
  • H
Out-of-bounds Write

<5:6.0.16-1
  • H
Integer Overflow or Wraparound

<5:6.0.16-1
  • L
CVE-2020-21468

*
  • H
Out-of-bounds Read

<5:6.0.15-1
  • H
Buffer Overflow

<5:6.0.14-1
  • H
Integer Overflow or Wraparound

<5:6.0.13-1
  • H
Integer Overflow or Wraparound

<5:6.0.13-1
  • L
Out-of-bounds Write

<5:6.0.9-1
  • H
Integer Overflow or Wraparound

<5:6.0.11-1
  • H
Out-of-bounds Write

<5:6.0.0-1
  • M
Improper Input Validation

<2:2.6.7-1
  • H
Out-of-Bounds

<5:5.0.4-1
  • H
Out-of-Bounds

<5:5.0.4-1
  • L
Improper Input Validation

<2:2.6.0-1
  • M
Access Restriction Bypass

<3:3.2.5-2
  • C
Integer Overflow or Wraparound

<5:4.0.10-1
  • C
Out-of-bounds Write

<5:4.0.10-1
  • H
Out-of-Bounds

<5:4.0.10-1
  • H
Security Features

<3:3.2.7-1
  • L
Out-of-Bounds

<4:4.0.2-5
  • C
Out-of-Bounds

<3:3.2.4-1
  • L
Information Exposure

<2:3.2.1-4
  • H
Numeric Errors

<2:3.0.5-4
  • C
Code

<2:3.0.2-1