Vulnerability Details CVE-2025-26268
DragonflyDB Dragonfly before 1.27.0 allows authenticated users to cause a denial of service (daemon crash) via a crafted Redis command. The validity of the scan cursor was not checked.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 8.2%
CVSS Severity
CVSS v3 Score 3.3
Products affected by CVE-2025-26268
-
cpe:2.3:a:dragonflydb:dragonfly:0.1.0
-
cpe:2.3:a:dragonflydb:dragonfly:0.1.1
-
cpe:2.3:a:dragonflydb:dragonfly:0.10.0
-
cpe:2.3:a:dragonflydb:dragonfly:0.11.0
-
cpe:2.3:a:dragonflydb:dragonfly:0.12.0
-
cpe:2.3:a:dragonflydb:dragonfly:0.13.0
-
cpe:2.3:a:dragonflydb:dragonfly:0.13.1
-
cpe:2.3:a:dragonflydb:dragonfly:0.14.0
-
cpe:2.3:a:dragonflydb:dragonfly:0.15.0
-
cpe:2.3:a:dragonflydb:dragonfly:0.16.0
-
cpe:2.3:a:dragonflydb:dragonfly:0.17.0
-
cpe:2.3:a:dragonflydb:dragonfly:0.2.0
-
cpe:2.3:a:dragonflydb:dragonfly:0.3.0
-
cpe:2.3:a:dragonflydb:dragonfly:0.3.1
-
cpe:2.3:a:dragonflydb:dragonfly:0.4.0
-
cpe:2.3:a:dragonflydb:dragonfly:0.5.0
-
cpe:2.3:a:dragonflydb:dragonfly:0.6.0
-
cpe:2.3:a:dragonflydb:dragonfly:0.7.0
-
cpe:2.3:a:dragonflydb:dragonfly:0.8.0
-
cpe:2.3:a:dragonflydb:dragonfly:0.9.0
-
cpe:2.3:a:dragonflydb:dragonfly:0.9.1
-
cpe:2.3:a:dragonflydb:dragonfly:1.0.0
-
cpe:2.3:a:dragonflydb:dragonfly:1.1.0
-
cpe:2.3:a:dragonflydb:dragonfly:1.1.1
-
cpe:2.3:a:dragonflydb:dragonfly:1.1.2
-
cpe:2.3:a:dragonflydb:dragonfly:1.10.0
-
cpe:2.3:a:dragonflydb:dragonfly:1.11.0
-
cpe:2.3:a:dragonflydb:dragonfly:1.12.0
-
cpe:2.3:a:dragonflydb:dragonfly:1.12.1
-
cpe:2.3:a:dragonflydb:dragonfly:1.13.0
-
cpe:2.3:a:dragonflydb:dragonfly:1.14.0
-
cpe:2.3:a:dragonflydb:dragonfly:1.14.1
-
cpe:2.3:a:dragonflydb:dragonfly:1.14.2
-
cpe:2.3:a:dragonflydb:dragonfly:1.14.3
-
cpe:2.3:a:dragonflydb:dragonfly:1.14.4
-
cpe:2.3:a:dragonflydb:dragonfly:1.14.5
-
cpe:2.3:a:dragonflydb:dragonfly:1.14.6
-
cpe:2.3:a:dragonflydb:dragonfly:1.14.7
-
cpe:2.3:a:dragonflydb:dragonfly:1.15.0
-
cpe:2.3:a:dragonflydb:dragonfly:1.15.1
-
cpe:2.3:a:dragonflydb:dragonfly:1.16.0
-
cpe:2.3:a:dragonflydb:dragonfly:1.16.1
-
cpe:2.3:a:dragonflydb:dragonfly:1.17.0
-
cpe:2.3:a:dragonflydb:dragonfly:1.17.1
-
cpe:2.3:a:dragonflydb:dragonfly:1.18.0
-
cpe:2.3:a:dragonflydb:dragonfly:1.18.1
-
cpe:2.3:a:dragonflydb:dragonfly:1.19.0
-
cpe:2.3:a:dragonflydb:dragonfly:1.19.1
-
cpe:2.3:a:dragonflydb:dragonfly:1.19.2
-
cpe:2.3:a:dragonflydb:dragonfly:1.2.0
-
cpe:2.3:a:dragonflydb:dragonfly:1.2.1
-
cpe:2.3:a:dragonflydb:dragonfly:1.20.0
-
cpe:2.3:a:dragonflydb:dragonfly:1.20.1
-
cpe:2.3:a:dragonflydb:dragonfly:1.21.0
-
cpe:2.3:a:dragonflydb:dragonfly:1.21.1
-
cpe:2.3:a:dragonflydb:dragonfly:1.21.2
-
cpe:2.3:a:dragonflydb:dragonfly:1.21.3
-
cpe:2.3:a:dragonflydb:dragonfly:1.21.4
-
cpe:2.3:a:dragonflydb:dragonfly:1.22.0
-
cpe:2.3:a:dragonflydb:dragonfly:1.22.1
-
cpe:2.3:a:dragonflydb:dragonfly:1.22.2
-
cpe:2.3:a:dragonflydb:dragonfly:1.23.0
-
cpe:2.3:a:dragonflydb:dragonfly:1.23.1
-
cpe:2.3:a:dragonflydb:dragonfly:1.23.2
-
cpe:2.3:a:dragonflydb:dragonfly:1.24.0
-
cpe:2.3:a:dragonflydb:dragonfly:1.25.0
-
cpe:2.3:a:dragonflydb:dragonfly:1.25.1
-
cpe:2.3:a:dragonflydb:dragonfly:1.25.2
-
cpe:2.3:a:dragonflydb:dragonfly:1.25.3
-
cpe:2.3:a:dragonflydb:dragonfly:1.25.4
-
cpe:2.3:a:dragonflydb:dragonfly:1.25.5
-
cpe:2.3:a:dragonflydb:dragonfly:1.25.6
-
cpe:2.3:a:dragonflydb:dragonfly:1.25.7
-
cpe:2.3:a:dragonflydb:dragonfly:1.26.0
-
cpe:2.3:a:dragonflydb:dragonfly:1.26.1
-
cpe:2.3:a:dragonflydb:dragonfly:1.26.2
-
cpe:2.3:a:dragonflydb:dragonfly:1.26.3
-
cpe:2.3:a:dragonflydb:dragonfly:1.26.4
-
cpe:2.3:a:dragonflydb:dragonfly:1.3.0
-
cpe:2.3:a:dragonflydb:dragonfly:1.4.0
-
cpe:2.3:a:dragonflydb:dragonfly:1.5.0
-
cpe:2.3:a:dragonflydb:dragonfly:1.6.0
-
cpe:2.3:a:dragonflydb:dragonfly:1.6.1
-
cpe:2.3:a:dragonflydb:dragonfly:1.6.2
-
cpe:2.3:a:dragonflydb:dragonfly:1.7.0
-
cpe:2.3:a:dragonflydb:dragonfly:1.7.1
-
cpe:2.3:a:dragonflydb:dragonfly:1.8.0
-
cpe:2.3:a:dragonflydb:dragonfly:1.9.0