Tag
#redis
Backdoor.Win32.Psychward.10 malware suffers from an unauthenticated remote command execution vulnerability.
Email-Worm.Win32.Kipis.c malware suffers from a remote file write vulnerability that allows for remote code execution.
Backdoor.Win32.Delf.arh malware suffers from an authentication bypass vulnerability.
A vulnerability, which was classified as problematic, was found in Redis. Affected is the function sigsegvHandler of the file debug.c of the component Crash Report. The manipulation leads to denial of service. The name of the patch is 0bf90d944313919eb8e63d3588bf63a367f020a3. It is recommended to apply a patch to fix this issue. VDB-211962 is the identifier assigned to this vulnerability.
Bifrost is a heterogeneous middleware that synchronizes MySQL, MariaDB to Redis, MongoDB, ClickHouse, MySQL and other services for production environments. Versions prior to 1.8.8-release are subject to authentication bypass in the admin and monitor user groups by deleting the X-Requested-With: XMLHttpRequest field in the request header. This issue has been patched in 1.8.8-release. There are no known workarounds.
RRX IOB LP version 1.0 suffers from a DNS cache snooping vulnerability.
WiFi File Transfer version 1.0.8 suffers from a cross site scripting vulnerability.
Backdoor.Win32.Redkod.d malware suffers from a hardcoded credential vulnerability.
Webile version 1.0.1 suffers from a directory traversal vulnerability.
Backdoor.Win32.DarkSky.23 malware suffers from a buffer overflow vulnerability.