Product
A remote, authenticated attacker can exploit multiple vulnerabilities in Redis to achieve arbitrary code execution.