{"uuid": "878f58e7-5c4a-40ae-b5d8-e25764f6e189", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-32948", "type": "published-proof-of-concept", "source": "https://t.me/HackingAndCrackingTools/367", "content": "kernel r/w exploit for iOS 15 and macOS 12 \n\n\nCVE-2022-32845 : aned signature check bypass for model.hwx.\nCVE-2022-32948 : DeCxt::FileIndexToWeight() OOB Read due to lack of array index validation.\nCVE-2022-42805 : ZinComputeProgramUpdateMutables() potential arbitrary read due to Integer overflow issue.\nCVE-2022-32899 : DeCxt::RasterizeScaleBiasData() Buffer underflow due to integer overflow issue.\n\n\ud83d\udcf1\niPhone12 Pro (iPhone13,3) with iOS 15.5.\niPad Pro (iPad8,10) with iPadOS 15.5.\niPhone11 Pro (iPhone12,3) with iOS 15.4.1.\nMacBookAir10,1 M1 with macOS 12.4.\n\n\u27a1\ufe0f PLEASE GIVE REACTION \u2620\ufe0f\n\n\ud83d\udd38SHARE OUR CHANNEL IN YOUR GROUP OR CHANNEL HELP US TO GROW\ud83d\udd3b", "creation_timestamp": "2023-10-18T22:22:08.000000Z"}