A vulnerability, which was classified as problematic, was found in Redis up to 5.0.13/6.0.15/6.2.5. This affects an unknown code block of the component Configuration Parameter Handler. Upgrading to version 5.0.14, 6.0.16 or 6.2.6 eliminates this vulnerability. Applying the patch c6ad876774f3cc11e32681ea02a2eead00f2c521 is able to eliminate this problem. The bugfix is ready for download at github.com. The best possible mitigation is suggested to be upgrading to the latest version.
Redis up to 5.0.13/6.0.15/6.2.5 Configuration Parameter integer overflow
CVE-2025-23208 : ZOT UP TO 2.1.1 API SETUSERGROUPS PRIVILEGES MANAGEMENT
Description zot is a production-ready vendor-neutral OCI image registry. The group data stored for users in the boltdb database (meta.db)
CVE-2024-12867 : ARCTIC SECURITY ARCTIC HUB UP TO 5.5.1872 CONFIGURATION SERVER-SIDE REQUEST FORGERY
Description Server-Side Request Forgery in URL Mapper in Arctic Security’s Arctic Hub versions 3.0.1764-5.6.1877 allows an unauthenticated remote attacker to
CVE-2024-12840 : RED HAT SATELLITE HTTP PROXY SERVER-SIDE REQUEST FORGERY
Description A server-side request forgery exists in Satellite. When a PUT HTTP request is made to /http_proxies/test_connection, when supplied with