antirez/redis vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://github.com|antirez/redis package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Use After Free

[,6.2.17)[7.0.0,7.2.7)[7.4.0,7.4.2)
  • M
Improper Input Validation

[,7.2.7)[7.4.0,7.4.2)
  • H
Stack-based Buffer Overflow

[2.6.0,6.2.16)[7.0.0,7.2.6)[7.3.0,7.4.1)
  • M
Uncontrolled Recursion

[2.2.5,6.2.16)[7.0.0,7.2.6)[7.3.0,7.4.1)
  • M
Improper Input Validation

[7.0.0,7.2.6)[7.3.0,7.4.1)
  • H
Heap-based Buffer Overflow

[7.0.9,7.0.15)[7.2.0,7.2.4)
  • L
Improper Privilege Management

[,7.0.14)[7.2-rc1,7.2.2)
  • L
Improper Privilege Management

[7.0.0,7.0.13)[7.2.0,7.2.1)
  • H
Denial of Service (DoS)

[,6.2.3)
  • H
Buffer Overflow

[,6.0.20)[6.2.0,6.2.13)[7.0.0,7.0.12)
  • H
Buffer Overflow

[7.0.0,7.0.12)
  • H
Denial of Service (DoS)

[7.0.10,)
  • M
Denial of Service (DoS)

[6.0.0,6.0.19)[6.2.0,6.2.12)[7.0.0,7.0.11)
  • M
Denial of Service (DoS)

[7.0.8,7.0.10)
  • M
Regular Expression Denial of Service (ReDoS)

[,6.0.18)[6.2-rc1,6.2.11)[7.0-rc1,7.0.9)
  • H
Integer Overflow or Wraparound

[,6.0.18)[6.2-rc1,6.2.11)[7.0-rc1,7.0.9)
  • M
Access Restriction Bypass

[,6.0.17)[6.2.0,6.2.9)[7.0.0,7.0.8)
  • M
Denial of Service (DoS)

[,6.2.9)[7.0.0,7.0.8)
  • M
Untrusted Search Path

[0,)
  • L
Denial of Service (DoS)

[0,)
  • H
Integer Overflow to Buffer Overflow

[7.0.0,7.0.5)
  • H
Denial of Service (DoS)

[7.0,7.0.1)
  • L
NULL Pointer Dereference

[,6.2.7)[7.0-rc1,7.0.0)
  • L
Arbitrary Code Injection

[,6.2.7)[7.0-rc,7.0.0)
  • M
Improper Input Validation

[,2.6.0]
  • C
Out-of-Bounds

[3.2.0,3.2.3]
  • M
Improper Input Validation

[,2.6.0)
  • H
Incorrect Type Conversion or Cast

[,5.0)
  • M
Out-of-bounds Read

[3.2.0,5.0.14)[6.0.0,6.0.16)[6.2.0,6.2.6)
  • H
Denial of Service (DoS)

[,2.8.24)
  • C
Integer Overflow or Wraparound

[,3.2.12)[4.0,4.0.10)
  • M
Out-of-bounds Write

[,5.0.10)[6.0.0,6.0.9)
  • H
Out-of-bounds Write

[3.0.0,3.2.13)[4.0.0,4.0.14)[5.0,5.0.4)
  • H
Integer Overflow or Wraparound

[6.2.0,6.2.3)
  • C
Out-of-Bounds

[,4.0.2]
  • C
Out-of-bounds Write

[,3.2.12)[4.0,4.0.10)
  • H
Out-of-Bounds

[,4.0.10)
  • H
Integer Overflow or Wraparound

[4.0,5.0.11)[6.0.0,6.0.11)
  • H
Out-of-bounds Write

[3.0.0,3.2.13)[4.0.0,4.0.14)[5.0,5.0.4)
  • H
Security Features

[,3.2.7)
  • C
Code

[,2.8.21)
  • H
Integer Overflow or Wraparound

[6.0.0,6.0.13)[6.2.0,6.2.3)
  • L
Information Exposure

[,3.2.3)
  • H
Out-of-bounds Write

[,5.0.9)[6.0.0,6.0.3)
  • H
Out-of-bounds Read

[2.2.0,5.0.13)[6.0,6.0.15)[6.2.0,6.2.5)