exploit/linux/redis/redis_replication_cmd_exec 2018-11-13 good Yes Redis Replication Code Execution 5 exploit/windows/browser/ie_createobject 2006-04-11 excellent No MS06-014 Microsoft Internet Explorer COM CreateObject Code Execution 6 exploit/windows/browser/ms07_017_ani_loadimage_chunksize 2007-03...
It's not a bug, unauthenticated code execution means that you can execute arbitrary code when the redis server ask no password to authenticate or you know the passwords to authenticate. @Xcess msf5 exploit(linux/redis/redis_unauth_exec) > options Module options (exploit/linux/redis/redis_unaut...
some time ago I published a proposal to add “real users” in Redis:https://github.com/redis/redis-rcp/blob/master/RCP1.mdThis proposal basically adds users with ACLs. It’s very similar to AUTH in the way it works and in the speed of execution, but different users have different capa...
No downtime:As every transaction potentially includes some AI processing, customers need to maintain the same level of SLA, preferably five-nines and above for mission-critical applications, using proven mechanisms such as replication, data-persistence, multi availability zone/rack, active-active geo...