{"vulnerability": "CVE-2022-24736", "sightings": [{"uuid": "20ade62b-f9ca-4036-a851-2b0d028a04cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24736", "type": "seen", "source": "https://gist.github.com/Darkcrai86/f18f6af044e5234d2b8ff21e7630cfe7", "content": "", "creation_timestamp": "2025-12-04T08:29:43.000000Z"}, {"uuid": "06364bce-39c6-4da3-926a-7602c1e1809e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24736", "type": "seen", "source": "https://t.me/cibsecurity/41538", "content": "\u203c CVE-2022-24736 \u203c\n\nRedis is an in-memory database that persists on disk. Prior to versions 6.2.7 and 7.0.0, an attacker attempting to load a specially crafted Lua script can cause NULL pointer dereference which will result with a crash of the redis-server process. The problem is fixed in Redis versions 7.0.0, 6.2.X and 6.0.X. An additional workaround to mitigate this problem without patching the redis-server executable, if Lua scripting is not being used, is to block access to `SCRIPT LOAD` and `EVAL` commands using ACL rules.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-28T00:13:24.000000Z"}]}