{"vulnerability": "CVE-2022-2264", "sightings": [{"uuid": "4dec1e4d-6d91-4457-8e57-bc0dd13435af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-22640", "type": "seen", "source": "https://t.me/ashaburroyah313/187", "content": "{(D)enial(OFF)ensive(S)ervice[ToolKit]}-{by_(io=psy+/03c8.net)}\n\n===========================================================================\n\n[AI] Abducting target to extract interesting information... Be patient!\n\n======================\n\n -Target URL: https://hy.health.gov.il\n\n -IP    : 62.90.118.183\n -IPv6  : OFF\n -Port  : 443\n\n -Domain: hy.health.gov.il\n\n---------\n\nTrying single visit broadband test (using GET)...\n\n -Bytes in : 58.7 KB\n -Load time: 6.04 seconds\n\n---------\n\nDetermining webserver fingerprint (note that this value can be a fake)...\n\n -Banner: Microsoft-IIS/8.5\n -V\u00eda   : NOT found!\n\n---------\n\nSearching for extra Anti-DDoS protections...\n\n -WAF/IDS: FIREWALL NOT PRESENT (or not discovered yet)! ;-)\n\n---------\n\nSearching at CVE (https://cve.mitre.org) for vulnerabilities...\n\n -Last Reports:\n\n        + CVE-2022-35282 -&gt; https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35282\n\n        + CVE-2022-34336 -&gt; https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34336\n\n        + CVE-2022-34165 -&gt; https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34165\n\n        + CVE-2022-22670 -&gt; https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22670\n\n        + CVE-2022-22666 -&gt; https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22666\n\n        + CVE-2022-22654 -&gt; https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22654\n\n        + CVE-2022-22640 -&gt; https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22640\n\n        + CVE-2022-22638 -&gt; https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22638\n\n        + CVE-2022-22637 -&gt; https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637\n\n        + CVE-2022-22633 -&gt; https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22633\n\n---------\n\n[Info] [AI] Abduction finished! -&gt; [OK!]", "creation_timestamp": "2022-10-01T14:47:50.000000Z"}, {"uuid": "f93937de-9d9c-4e57-876b-f718d1aad4d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-22640", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/2109", "content": "#Offensive_security\n\"More Tales from the iOS/macOS Kernel Trenches (Kernel: CVE-2022-22640, IOGPU (Kernel Driver): CVE-2022-32821)\"", "creation_timestamp": "2023-01-05T15:08:24.000000Z"}, {"uuid": "9822775b-c3e7-4524-848b-c0c7fe434bb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-22640", "type": "seen", "source": "https://t.me/cibsecurity/39260", "content": "\u203c CVE-2022-22640 \u203c\n\nA memory corruption issue was addressed with improved validation. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4, macOS Monterey 12.3, watchOS 8.5. An application may be able to execute arbitrary code with kernel privileges.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-18T21:36:43.000000Z"}, {"uuid": "f9e2bba6-2a4f-411c-a86a-66f747909727", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-22644", "type": "seen", "source": "https://t.me/cibsecurity/39255", "content": "\u203c CVE-2022-22644 \u203c\n\nA privacy issue existed in the handling of Contact cards. This was addressed with improved state management. This issue is fixed in macOS Monterey 12.3. A malicious application may be able to access information about a user's contacts.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-18T21:29:10.000000Z"}, {"uuid": "73a01049-c5db-4ab1-a052-f44d00ddbecf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-22646", "type": "seen", "source": "https://t.me/cibsecurity/68513", "content": "\u203c CVE-2022-22646 \u203c\n\nThis issue was addressed by removing the vulnerable code. This issue is fixed in macOS Monterey 12.2. A malicious application may be able to modify protected parts of the file system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-15T02:20:00.000000Z"}, {"uuid": "9cbca97a-f271-42b5-8b7a-ac4d61abee88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2264", "type": "seen", "source": "https://t.me/cibsecurity/45468", "content": "\u203c CVE-2022-2264 \u203c\n\nHeap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-01T14:39:29.000000Z"}, {"uuid": "55815fe2-ffd9-4fb4-b8a9-a61883a08ec7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-22640", "type": "published-proof-of-concept", "source": "https://t.me/hackingshadow/2934", "content": "#Offensive_security\n\"More Tales from the iOS/macOS Kernel Trenches (Kernel: CVE-2022-22640, IOGPU (Kernel Driver): CVE-2022-32821)\"", "creation_timestamp": "2023-01-05T15:08:19.000000Z"}, {"uuid": "f1305421-279d-4ca4-b962-e64d4a537e00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-22640", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/7486", "content": "#Offensive_security\n\"More Tales from the iOS/macOS Kernel Trenches (Kernel: CVE-2022-22640, IOGPU (Kernel Driver): CVE-2022-32821)\"", "creation_timestamp": "2025-01-12T23:38:47.000000Z"}]}