{"vulnerability": "CVE-2022-24834", "sightings": [{"uuid": "f4158d51-0f68-42f3-a239-6b27727b7255", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-24834", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/192", "content": "CVE-2022-24834 Redis\n*\n\u0417\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u043e:\n7.0.0 \u2264 version &lt; 7.0.12\n6.2.0 \u2264 version &lt; 6.2.13\n2.6.0 \u2264 version &lt; 6.0.20\n*\n\u0411\u043e\u043b\u044c\u0448\u043e\u0439 \u0440\u0430\u0437\u0431\u043e\u0440 + PoC exploit RCE\n*\nVideoPOC\n\n#redis #rce", "creation_timestamp": "2024-08-20T04:47:35.000000Z"}, {"uuid": "67854770-b418-483f-858d-b77f500162fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-24834", "type": "published-proof-of-concept", "source": "https://t.me/CipherAgents/1350811", "content": "CVE-2022-24834 Redis\n*\n:\n7.0.0 \u2264 version &lt; 7.0.12\n6.2.0 \u2264 version &lt; 6.2.13\n2.6.0 \u2264 version &lt; 6.0.20\n* PoC exploit RCE\n*\nVideoPOC\n\n#ih #neural_network #error_correction_chanics #quantum_protocols", "creation_timestamp": "2024-08-19T18:20:53.000000Z"}, {"uuid": "9bcfbd5d-5c8e-4bea-a95e-d98865a3fa2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-24834", "type": "seen", "source": "https://t.me/cibsecurity/66666", "content": "\u203c CVE-2022-24834 \u203c\n\nRedis is an in-memory database that persists on disk. A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson library, and result with heap corruption and potentially remote code execution. The problem exists in all versions of Redis with Lua scripting support, starting from 2.6, and affects only authenticated and authorized users. The problem is fixed in versions 7.0.12, 6.2.13, and 6.0.20.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-13T18:11:42.000000Z"}, {"uuid": "de8422d4-8196-4d27-a17c-d2d3798898a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-24834", "type": "seen", "source": "https://t.me/cvedetector/1475", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6121 - An out-of-date version of Redis shipped with NI Sy\", \n  \"Content\": \"CVE ID : CVE-2024-6121 \nPublished : July 22, 2024, 8:15 p.m. | 27\u00a0minutes ago \nDescription : An out-of-date version of Redis shipped with NI SystemLink Server is susceptible to multiple vulnerabilities, including CVE-2022-24834.  This affects NI SystemLink Server 2024 Q1 and prior versions.  It also affects NI FlexLogger 2023 Q2 and prior versions which installed this shared service. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-22T22:50:49.000000Z"}, {"uuid": "add0e4ea-8067-4ea7-9227-7faa1eceb8f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-24834", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2237", "content": "CVE-2022-24834 Redis\n*\n\u0417\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u043e:\n7.0.0 \u2264 version &lt; 7.0.12\n6.2.0 \u2264 version &lt; 6.2.13\n2.6.0 \u2264 version &lt; 6.0.20\n*\n\u0411\u043e\u043b\u044c\u0448\u043e\u0439 \u0440\u0430\u0437\u0431\u043e\u0440 + PoC exploit RCE\n*\nVideoPOC\n\n#redis #rce", "creation_timestamp": "2024-08-18T21:56:13.000000Z"}, {"uuid": "daaab3c8-1814-492e-b5e7-f8c853aba9a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-24834", "type": "published-proof-of-concept", "source": "https://t.me/orderofsixangles/2344", "content": "Real World CVE-2022-24834 Exploitation on an Alpine mallocng Heap\n\nhttps://research.nccgroup.com/2024/06/11/pumping-iron-on-the-musl-heap-real-world-cve-2022-24834-exploitation-on-an-alpine-mallocng-heap/", "creation_timestamp": "2024-06-12T05:22:53.000000Z"}]}