{"vulnerability": "CVE-2023-28425", "sightings": [{"uuid": "830d4985-8070-496c-b430-73e1680791a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28425", "type": "seen", "source": "https://t.me/cibsecurity/60350", "content": "\u203c CVE-2023-28425 \u203c\n\nRedis is an in-memory database that persists on disk. Starting in version 7.0.8 and prior to version 7.0.10, authenticated users can use the MSETNX command to trigger a runtime assertion and termination of the Redis server process. The problem is fixed in Redis version 7.0.10.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-02T22:23:59.000000Z"}, {"uuid": "48d2b61b-3d9f-4117-b05d-5b8fd9911c74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28425", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8053", "content": "#exploit\n1. Dissecting redis CVE-2023-28425 with chatGPT as assistant\nhttps://tin-z.github.io/redis/cve/chatgpt/2023/04/02/redis-cve2023.html\n\n2. CVE-2022-2884:\nGitLab v.15.3 - RCE (Authenticated)\nhttps://www.exploit-db.com/exploits/51181\n\n3. CVE-2022-39396:\nAnalysis of parse-server from prototype pollution to RCE vulnerability\nhttps://paper.seebug.org/2059", "creation_timestamp": "2023-04-04T11:01:01.000000Z"}]}