{"vulnerability": "CVE-2024-31449", "sightings": [{"uuid": "9f9efec4-93ce-45ca-90b6-61fae82b402e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31449", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3mjmuwtjmol24", "content": "", "creation_timestamp": "2026-04-16T16:57:20.059304Z"}, {"uuid": "f2aef0b0-ce1c-40ea-ad83-bb5c307ba472", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31449", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-15T13:28:31.000000Z"}, {"uuid": "3bf40975-1ef4-4723-93ab-eb6999dd27bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31449", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-16T03:45:02.000000Z"}, {"uuid": "7ff1f5fb-62ac-4c0d-b121-273ec69d71b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31449", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3mjmyl53ovl2h", "content": "", "creation_timestamp": "2026-04-16T18:02:27.408828Z"}, {"uuid": "97b792c1-9bc5-488e-8958-5cc6db60628d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31449", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3mjn7kppwm42v", "content": "", "creation_timestamp": "2026-04-16T20:08:03.977633Z"}, {"uuid": "49ab1a96-237f-4452-9cac-a146bcb8acf0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31449", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3mjn7totark23", "content": "", "creation_timestamp": "2026-04-16T20:13:15.336455Z"}, {"uuid": "b10efd77-e0fc-4bca-b973-833977b3f4bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31449", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3mjnowwxgb225", "content": "", "creation_timestamp": "2026-04-17T00:42:39.409299Z"}, {"uuid": "90983068-5ac3-4a74-aa6f-7d6690617dff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31449", "type": "seen", "source": "https://t.me/CyberBulletin/1523", "content": "\u26a1\ufe0fRedis CVE-2024-31449: How to Reproduce and Mitigate the Vulnerability.\n\n#CyberBulletin", "creation_timestamp": "2024-11-19T06:34:54.000000Z"}, {"uuid": "5372f861-9a28-4c2c-8454-e1946ce41361", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31449", "type": "seen", "source": "https://t.me/HackingInsights/15381", "content": "\u200aRedis Patches for Multi Flaws, Including Potential RCE (CVE-2024-31449)\n\nhttps://securityonline.info/redis-patches-for-multi-flaws-including-potential-rce-cve-2024-31449/", "creation_timestamp": "2024-10-08T03:27:20.000000Z"}, {"uuid": "c90c38f5-857c-40e2-a90e-661df6dc6983", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31449", "type": "seen", "source": "https://t.me/cvedetector/7272", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-31449 - Redis Lua Scripting Stack Buffer Overflow (Remote Code Execution Vulnerability)\", \n  \"Content\": \"CVE ID : CVE-2024-31449 \nPublished : Oct. 7, 2024, 8:15 p.m. | 24\u00a0minutes ago \nDescription : Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 7.0 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-07T22:39:26.000000Z"}, {"uuid": "d7d56432-460a-478f-ad17-a2db0b3eb9ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31449", "type": "seen", "source": "https://t.me/CyberBulletin/1098", "content": "\u26a1\ufe0fRedis Patches for Multi Flaws, Including Potential RCE (CVE-2024-31449).\n\n#CyberBulletin", "creation_timestamp": "2024-10-07T13:16:32.000000Z"}, {"uuid": "f6bda8c1-5d09-4f46-b681-a0bc9732dc89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31449", "type": "seen", "source": "https://t.me/InfoSecInsider/24567", "content": "\u26a1\ufe0fRedis CVE-2024-31449: How to Reproduce and Mitigate the Vulnerability.\n\n#CyberBulletin", "creation_timestamp": "2024-11-19T06:37:13.000000Z"}, {"uuid": "0c24aa1d-389f-44eb-9960-ebf7723630bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31449", "type": "published-proof-of-concept", "source": "Telegram/hwxTPI13zjfOP4QVdjfyo4btTJ66KygK04v-mdNXcVwmgy0", "content": "", "creation_timestamp": "2025-04-28T09:00:07.000000Z"}, {"uuid": "29297a9d-7508-44f0-ab2c-554846b93fe5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31449", "type": "published-proof-of-concept", "source": "https://t.me/CyberBulletin/26497", "content": "\u26a1\ufe0fRedis CVE-2024-31449: How to Reproduce and Mitigate the Vulnerability.\n\n#CyberBulletin", "creation_timestamp": "2024-11-19T06:34:54.000000Z"}, {"uuid": "080a2fda-0fdf-4e7a-98a5-9a5db82f5f1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31449", "type": "seen", "source": "https://t.me/BlackLineCH/63", "content": "CVE-2024-31449 dan lainnya: Beberapa kerentanan di Redis, rating 4.5 - 8.8\n\nTiga kerentanan terbaru memungkinkan penyerang untuk melakukan Remote Code Execution (RCE) akibat kesalahan dalam Lua scripting engine atau serangan Denial of Service (DoS) melalui Access Control List yang salah.\n\nCari di Netlas.io: \n\ud83d\udc49 Link: https://nt.ls/1G7ul \n\ud83d\udc49 Dork: protocol:redis\n\nAdvisori dari vendor: https://github.com/redis/redis/security/advisories/GHSA-whxg-wx83-85p5\n\n#BlackLine", "creation_timestamp": "2024-10-07T15:24:43.000000Z"}, {"uuid": "17a3efed-9d92-4e9e-a157-ebdc8a5f298f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31449", "type": "seen", "source": "https://t.me/CyberBulletin/26008", "content": "\u26a1\ufe0fRedis Patches for Multi Flaws, Including Potential RCE (CVE-2024-31449).\n\n#CyberBulletin", "creation_timestamp": "2024-10-08T18:50:12.000000Z"}, {"uuid": "22a6e67f-f80a-4b5c-a29e-392db934067e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31449", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/721", "content": "\u26a1\ufe0fRedis CVE-2024-31449: How to Reproduce and Mitigate the Vulnerability.\n\n#CyberBulletin", "creation_timestamp": "2024-11-19T06:37:13.000000Z"}, {"uuid": "acb98d0e-2b74-4f5e-bb0b-1f47aa438e3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31449", "type": "seen", "source": "https://t.me/cyberteamvlayingsecurity/495", "content": "CVE-2024-31449 dan lainnya: Beberapa kerentanan di Redis, rating 4.5 - 8.8\n\nTiga kerentanan terbaru memungkinkan penyerang untuk melakukan Remote Code Execution (RCE) akibat kesalahan dalam Lua scripting engine atau serangan Denial of Service (DoS) melalui Access Control List yang salah.\n\nCari di Netlas.io: \n\ud83d\udc49 Link: https://nt.ls/1G7ul \n\ud83d\udc49 Dork: protocol:redis\n\nAdvisori dari vendor: https://github.com/redis/redis/security/advisories/GHSA-whxg-wx83-85p5\n\n#BlackLine", "creation_timestamp": "2024-10-07T15:35:52.000000Z"}]}