{"vulnerability": "CVE-2022-28738", "sightings": [{"uuid": "bf88e449-6fd2-47a7-bbed-02b9c515747c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-28738", "type": "seen", "source": "https://t.me/ctinow/52874", "content": "Internet Bug Bounty: CVE-2022-28738: Double free in Regexp compilation\n\nhttps://ift.tt/wLqCV9G", "creation_timestamp": "2022-05-30T17:01:48.000000Z"}, {"uuid": "c7c46156-07e2-444c-a6b5-75a881fdadd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-28738", "type": "seen", "source": "https://t.me/cibsecurity/42209", "content": "\u203c CVE-2022-28738 \u203c\n\nA double free was found in the Regexp compiler in Ruby 3.x before 3.0.4 and 3.1.x before 3.1.2. If a victim attempts to create a Regexp from untrusted user input, an attacker may be able to write to unexpected memory locations.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-09T22:33:13.000000Z"}]}