{"vulnerability": "CVE-2022-36021", "sightings": [{"uuid": "f788b69f-f669-4883-9024-fcaa77d35acd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36021", "type": "seen", "source": "https://t.me/cibsecurity/59245", "content": "\u203c CVE-2022-36021 \u203c\n\nRedis is an in-memory database that persists on disk. Authenticated users can use string matching commands (like `SCAN` or `KEYS`) with a specially crafted pattern to trigger a denial-of-service attack on Redis, causing it to hang and consume 100% CPU time. The problem is fixed in Redis versions 6.0.18, 6.2.11, 7.0.9.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-01T18:33:46.000000Z"}]}