{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T02:43:02.569","vulnerabilities":[{"cve":{"id":"CVE-2024-51480","sourceIdentifier":"security-advisories@github.com","published":"2025-01-08T16:15:34.993","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"RedisTimeSeries is a time-series database (TSDB) module for Redis, by Redis. Executing one of these commands TS.QUERYINDEX, TS.MGET, TS.MRAGE, TS.MREVRANGE by an authenticated user, using specially crafted command arguments may cause an integer overflow, a subsequent heap overflow, and potentially lead to remote code execution. This vulnerability is fixed in 1.6.20, 1.8.15, 1.10.15, and 1.12.3."},{"lang":"es","value":"RedisTimeSeries es un módulo de base de datos de series temporales (TSDB) para Redis, creado por Redis. La ejecución de uno de estos comandos TS.QUERYINDEX, TS.MGET, TS.MRAGE, TS.MREVRANGE por parte de un usuario autenticado, utilizando argumentos de comando especialmente manipulados, puede provocar un desbordamiento de enteros, un desbordamiento de montón posterior y, potencialmente, provocar la ejecución remota de código. Esta vulnerabilidad se ha corregido en las versiones 1.6.20, 1.8.15, 1.10.15 y 1.12.3."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.0,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.0,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-122"},{"lang":"en","value":"CWE-190"}]}],"references":[{"url":"https://github.com/RedisTimeSeries/RedisTimeSeries/security/advisories/GHSA-73x6-fqww-x8rg","source":"security-advisories@github.com"}]}}]}