<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-04-30T14:07:35.729367+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/13c9b8ed-a854-46d4-8ac5-f47d90670b6c/export</id>
    <title>13c9b8ed-a854-46d4-8ac5-f47d90670b6c</title>
    <updated>2026-04-30T14:07:35.947381+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "13c9b8ed-a854-46d4-8ac5-f47d90670b6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42821", "type": "seen", "source": "https://t.me/itsec_news/5124", "content": "\u200b\u26a1\ufe0f\u0410\u0445\u0438\u043b\u043b\u0435\u0441\u043e\u0432\u0430 \u043f\u044f\u0442\u0430 macOS: \u043d\u043e\u0432\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0433\u0440\u043e\u0436\u0430\u0435\u0442 \u0441\u0430\u043c\u043e\u043c\u0443 \u0441\u0435\u0440\u0434\u0446\u0443 \u0441\u0438\u0441\u0442\u0435\u043c\u044b\n\n\ud83d\udcac \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0438\u0437 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Microsoft \u0432\u044b\u044f\u0432\u0438\u043b\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Apple macOS, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0443\u044e \u043e\u0431\u043e\u0439\u0442\u0438 System Integrity Protection (SIP) \u0438 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0435 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u044b, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0441\u0442\u043e\u0440\u043e\u043d\u043d\u0438\u0435 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u044f \u044f\u0434\u0440\u0430.\n\nSIP \u2014 \u044d\u0442\u043e \u0444\u0443\u043d\u043a\u0446\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 macOS, \u0437\u0430\u0449\u0438\u0449\u0430\u044e\u0449\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0435 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u044b \u043e\u0442 \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u0439. \u041e\u043d\u0430 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0438\u0432\u0430\u0435\u0442 \u043f\u0440\u0430\u0432\u0430 root-\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u0432 \u0437\u0430\u0449\u0438\u0449\u0451\u043d\u043d\u044b\u0445 \u043e\u0431\u043b\u0430\u0441\u0442\u044f\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u044b, \u0440\u0430\u0437\u0440\u0435\u0448\u0430\u044f \u043c\u043e\u0434\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0442\u043e\u043b\u044c\u043a\u043e \u043f\u043e\u0434\u043f\u0438\u0441\u0430\u043d\u043d\u044b\u043c Apple \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430\u043c \u0438\u043b\u0438 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0430\u043c \u0441 \u043e\u0441\u043e\u0431\u044b\u043c\u0438 \u043f\u043e\u043b\u043d\u043e\u043c\u043e\u0447\u0438\u044f\u043c\u0438.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0430\u044f \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440 CVE-2024-44243, \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0432 \u0434\u0435\u043c\u043e\u043d-\u0441\u0435\u0440\u0432\u0438\u0441\u0435 Storage Kit, \u043e\u0442\u0432\u0435\u0447\u0430\u044e\u0449\u0435\u043c \u0437\u0430 \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0434\u0438\u0441\u043a\u043e\u0432. \u0414\u043b\u044f \u0435\u0451 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0442\u0440\u0435\u0431\u0443\u0435\u0442\u0441\u044f \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f, root-\u043f\u0440\u0430\u0432\u0430 \u0438 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435 \u0441 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c, \u0447\u0442\u043e \u0434\u0435\u043b\u0430\u0435\u0442 \u0430\u0442\u0430\u043a\u0443 \u043e\u0442\u043d\u043e\u0441\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0441\u043b\u043e\u0436\u043d\u043e\u0439. \u041e\u0434\u043d\u0430\u043a\u043e \u0443\u0441\u043f\u0435\u0448\u043d\u043e\u0435 \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u0435 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043e\u0431\u043e\u0439\u0442\u0438 SIP, \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u00ab\u043d\u0435\u0443\u0434\u0430\u043b\u044f\u0435\u043c\u044b\u0435\u00bb \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b, \u0442\u0430\u043a\u0438\u0435 \u043a\u0430\u043a \u0440\u0443\u0442\u043a\u0438\u0442\u044b, \u0438 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0434\u0430\u043d\u043d\u044b\u043c, \u043e\u0431\u0445\u043e\u0434\u044f \u043b\u044e\u0431\u044b\u0435 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.\n\n11 \u0434\u0435\u043a\u0430\u0431\u0440\u044f 2024 \u0433\u043e\u0434\u0430 Apple \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f macOS Sequoia 15.2, \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u044e\u0449\u0435\u0435 \u0434\u0430\u043d\u043d\u0443\u044e \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443.\n\nSIP \u0438\u0433\u0440\u0430\u0435\u0442 \u043a\u043b\u044e\u0447\u0435\u0432\u0443\u044e \u0440\u043e\u043b\u044c \u0432 \u0437\u0430\u0449\u0438\u0442\u0435 macOS \u043e\u0442 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u0438 \u0430\u0442\u0430\u043a. \u041f\u043e \u0441\u043b\u043e\u0432\u0430\u043c Microsoft, \u043e\u0431\u0445\u043e\u0434 SIP \u0441\u0442\u0430\u0432\u0438\u0442 \u043f\u043e\u0434 \u0443\u0433\u0440\u043e\u0437\u0443 \u0432\u0441\u044e \u0441\u0438\u0441\u0442\u0435\u043c\u0443, \u043f\u043e\u0434\u0447\u0451\u0440\u043a\u0438\u0432\u0430\u044f \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0430\u0434\u0451\u0436\u043d\u044b\u0445 \u0440\u0435\u0448\u0435\u043d\u0438\u0439 \u0434\u043b\u044f \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0430\u043d\u043e\u043c\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u043e\u0432\u0435\u0434\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439.\n\nMicrosoft \u0442\u0430\u043a\u0436\u0435 \u043d\u0430\u043f\u043e\u043c\u043d\u0438\u043b\u0430 \u043e \u043f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u0445 macOS, \u0432\u043a\u043b\u044e\u0447\u0430\u044f Shrootless (CVE-2021-30892), Migraine (CVE-2023-32369), Achilles (CVE-2022-42821) \u0438 Powerdir (CVE-2021-30970), \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0438\u0435 \u043e\u0431\u043e\u0439\u0442\u0438 \u043a\u043b\u044e\u0447\u0435\u0432\u044b\u0435 \u044d\u043b\u0435\u043c\u0435\u043d\u0442\u044b \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.\n\n\u0412\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u0435 \u0442\u0430\u043a\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043f\u043e\u0434\u0447\u0451\u0440\u043a\u0438\u0432\u0430\u0435\u0442 \u0432\u0430\u0436\u043d\u043e\u0441\u0442\u044c \u043f\u043e\u0441\u0442\u043e\u044f\u043d\u043d\u043e\u0433\u043e \u0430\u043d\u0430\u043b\u0438\u0437\u0430 \u0434\u0430\u0436\u0435 \u0441\u0430\u043c\u044b\u0445 \u0437\u0430\u0449\u0438\u0449\u0451\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c. \u0421\u043e\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u0430\u044f \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u0442\u0440\u0435\u0431\u0443\u0435\u0442 \u043d\u0435 \u0442\u043e\u043b\u044c\u043a\u043e \u0440\u0435\u0430\u043a\u0442\u0438\u0432\u043d\u044b\u0445 \u043c\u0435\u0440, \u043d\u043e \u0438 \u043f\u0440\u043e\u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0433\u043e \u043f\u043e\u0434\u0445\u043e\u0434\u0430, \u0447\u0442\u043e\u0431\u044b \u043f\u0440\u0435\u0434\u0432\u043e\u0441\u0445\u0438\u0449\u0430\u0442\u044c \u0443\u0433\u0440\u043e\u0437\u044b \u0438 \u043c\u0438\u043d\u0438\u043c\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0440\u0438\u0441\u043a\u0438.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2025-01-14T13:05:19.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/13c9b8ed-a854-46d4-8ac5-f47d90670b6c/export"/>
    <published>2025-01-14T13:05:19+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/500afab7-b612-4679-84e7-cc9e4e8292cf/export</id>
    <title>500afab7-b612-4679-84e7-cc9e4e8292cf</title>
    <updated>2026-04-30T14:07:35.947334+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "500afab7-b612-4679-84e7-cc9e4e8292cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42827", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:40.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/500afab7-b612-4679-84e7-cc9e4e8292cf/export"/>
    <published>2025-02-23T02:10:40+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/38a70b7f-3436-43b3-81af-e996881ffd58/export</id>
    <title>38a70b7f-3436-43b3-81af-e996881ffd58</title>
    <updated>2026-04-30T14:07:35.947278+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "38a70b7f-3436-43b3-81af-e996881ffd58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42823", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12689", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-42823\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A type confusion issue was addressed with improved memory handling. This issue is fixed in tvOS 16.1, macOS Ventura 13, watchOS 9.1, Safari 16.1, iOS 16.1 and iPadOS 16. Processing maliciously crafted web content may lead to arbitrary code execution.\n\ud83d\udccf Published: 2022-11-01T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-21T15:39:06.209Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/HT213488\n2. https://support.apple.com/en-us/HT213489\n3. https://support.apple.com/en-us/HT213492\n4. https://support.apple.com/en-us/HT213495\n5. https://support.apple.com/en-us/HT213491\n6. http://www.openwall.com/lists/oss-security/2022/11/04/4\n7. https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/\n8. https://www.debian.org/security/2022/dsa-5273\n9. https://www.debian.org/security/2022/dsa-5274\n10. https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html\n11. https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/\n12. https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/\n13. https://security.gentoo.org/glsa/202305-32", "creation_timestamp": "2025-04-21T16:02:57.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/38a70b7f-3436-43b3-81af-e996881ffd58/export"/>
    <published>2025-04-21T16:02:57+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/4d398a83-330d-4d8f-8991-0a992cf6a74d/export</id>
    <title>4d398a83-330d-4d8f-8991-0a992cf6a74d</title>
    <updated>2026-04-30T14:07:35.947221+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "4d398a83-330d-4d8f-8991-0a992cf6a74d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42824", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12691", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-42824\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A logic issue was addressed with improved state management. This issue is fixed in tvOS 16.1, macOS Ventura 13, watchOS 9.1, Safari 16.1, iOS 16.1 and iPadOS 16. Processing maliciously crafted web content may disclose sensitive user information.\n\ud83d\udccf Published: 2022-11-01T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-21T15:32:51.273Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/HT213488\n2. https://support.apple.com/en-us/HT213489\n3. https://support.apple.com/en-us/HT213492\n4. https://support.apple.com/en-us/HT213495\n5. https://support.apple.com/en-us/HT213491\n6. http://www.openwall.com/lists/oss-security/2022/11/04/4\n7. https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/\n8. https://www.debian.org/security/2022/dsa-5273\n9. https://www.debian.org/security/2022/dsa-5274\n10. https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html\n11. https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/\n12. https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/\n13. https://security.gentoo.org/glsa/202305-32", "creation_timestamp": "2025-04-21T16:02:59.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/4d398a83-330d-4d8f-8991-0a992cf6a74d/export"/>
    <published>2025-04-21T16:02:59+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/43a6f44d-ed34-4738-8b96-b1c4869c49fb/export</id>
    <title>43a6f44d-ed34-4738-8b96-b1c4869c49fb</title>
    <updated>2026-04-30T14:07:35.947167+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "43a6f44d-ed34-4738-8b96-b1c4869c49fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42825", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12693", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-42825\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: This issue was addressed by removing additional entitlements. This issue is fixed in tvOS 16.1, macOS Ventura 13, watchOS 9.1, iOS 16.1 and iPadOS 16, macOS Monterey 12.6.1, macOS Big Sur 11.7.1. An app may be able to modify protected parts of the file system.\n\ud83d\udccf Published: 2022-11-01T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-21T15:30:29.181Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/HT213488\n2. https://support.apple.com/en-us/HT213493\n3. https://support.apple.com/en-us/HT213494\n4. https://support.apple.com/en-us/HT213489\n5. https://support.apple.com/en-us/HT213492\n6. https://support.apple.com/en-us/HT213491", "creation_timestamp": "2025-04-21T16:03:01.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/43a6f44d-ed34-4738-8b96-b1c4869c49fb/export"/>
    <published>2025-04-21T16:03:01+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/629b430b-9e7e-430d-933a-737cd2788c28/export</id>
    <title>629b430b-9e7e-430d-933a-737cd2788c28</title>
    <updated>2026-04-30T14:07:35.947105+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "629b430b-9e7e-430d-933a-737cd2788c28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42821", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12710", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-42821\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A logic issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.6.2, macOS Big Sur 11.7.2, macOS Ventura 13. An app may bypass Gatekeeper checks.\n\ud83d\udccf Published: 2022-12-15T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-21T16:11:26.397Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/HT213488\n2. https://support.apple.com/en-us/HT213534\n3. https://support.apple.com/en-us/HT213533\n4. http://seclists.org/fulldisclosure/2022/Dec/25\n5. http://seclists.org/fulldisclosure/2022/Dec/24", "creation_timestamp": "2025-04-21T17:01:59.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/629b430b-9e7e-430d-933a-737cd2788c28/export"/>
    <published>2025-04-21T17:01:59+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b0e89e21-cf9b-4536-a574-3a9d361fa65a/export</id>
    <title>b0e89e21-cf9b-4536-a574-3a9d361fa65a</title>
    <updated>2026-04-30T14:07:35.947050+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b0e89e21-cf9b-4536-a574-3a9d361fa65a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42820", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12745", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-42820\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 16.1 and iPadOS 16, macOS Ventura 13. An app may cause unexpected app termination or arbitrary code execution.\n\ud83d\udccf Published: 2022-11-01T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-21T19:56:35.709Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/HT213488\n2. https://support.apple.com/en-us/HT213489", "creation_timestamp": "2025-04-21T20:03:16.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b0e89e21-cf9b-4536-a574-3a9d361fa65a/export"/>
    <published>2025-04-21T20:03:16+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/4ed05dad-9360-443e-b260-c9876fef207c/export</id>
    <title>4ed05dad-9360-443e-b260-c9876fef207c</title>
    <updated>2026-04-30T14:07:35.946987+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "4ed05dad-9360-443e-b260-c9876fef207c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42829", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12746", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-42829\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A use after free issue was addressed with improved memory management. This issue is fixed in iOS 16.1 and iPadOS 16, macOS Ventura 13. An app with root privileges may be able to execute arbitrary code with kernel privileges.\n\ud83d\udccf Published: 2022-11-01T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-21T19:55:36.705Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/HT213488\n2. https://support.apple.com/en-us/HT213489", "creation_timestamp": "2025-04-21T20:03:17.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/4ed05dad-9360-443e-b260-c9876fef207c/export"/>
    <published>2025-04-21T20:03:17+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/dfb601b3-248f-46de-a2e5-e76e0b34899d/export</id>
    <title>dfb601b3-248f-46de-a2e5-e76e0b34899d</title>
    <updated>2026-04-30T14:07:35.946903+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "dfb601b3-248f-46de-a2e5-e76e0b34899d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42827", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/31139190-9002-4aef-a077-337db2ee3647", "content": "", "creation_timestamp": "2026-02-02T12:27:10.528030Z"}</content>
    <link href="https://db.gcve.eu/sighting/dfb601b3-248f-46de-a2e5-e76e0b34899d/export"/>
    <published>2026-02-02T12:27:10.528030+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d541fba0-f644-4239-9838-bed6589c1f5c/export</id>
    <title>d541fba0-f644-4239-9838-bed6589c1f5c</title>
    <updated>2026-04-30T14:07:35.943357+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d541fba0-f644-4239-9838-bed6589c1f5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42827", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/31139190-9002-4aef-a077-337db2ee3647", "content": "", "creation_timestamp": "2026-02-02T12:27:10.528030Z"}</content>
    <link href="https://db.gcve.eu/sighting/d541fba0-f644-4239-9838-bed6589c1f5c/export"/>
    <published>2026-02-02T12:27:10.528030+00:00</published>
  </entry>
</feed>
