{"vulnerability": "CVE-2022-22640", "sightings": [{"uuid": "f93937de-9d9c-4e57-876b-f718d1aad4d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-22640", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/2109", "content": "#Offensive_security\n\"More Tales from the iOS/macOS Kernel Trenches (Kernel: CVE-2022-22640, IOGPU (Kernel Driver): CVE-2022-32821)\"", "creation_timestamp": "2023-01-05T15:08:24.000000Z"}, {"uuid": "9822775b-c3e7-4524-848b-c0c7fe434bb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-22640", "type": "seen", "source": "https://t.me/cibsecurity/39260", "content": "\u203c CVE-2022-22640 \u203c\n\nA memory corruption issue was addressed with improved validation. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4, macOS Monterey 12.3, watchOS 8.5. An application may be able to execute arbitrary code with kernel privileges.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-18T21:36:43.000000Z"}, {"uuid": "f1305421-279d-4ca4-b962-e64d4a537e00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-22640", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/7486", "content": "#Offensive_security\n\"More Tales from the iOS/macOS Kernel Trenches (Kernel: CVE-2022-22640, IOGPU (Kernel Driver): CVE-2022-32821)\"", "creation_timestamp": "2025-01-12T23:38:47.000000Z"}, {"uuid": "55815fe2-ffd9-4fb4-b8a9-a61883a08ec7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-22640", "type": "published-proof-of-concept", "source": "https://t.me/hackingshadow/2934", "content": "#Offensive_security\n\"More Tales from the iOS/macOS Kernel Trenches (Kernel: CVE-2022-22640, IOGPU (Kernel Driver): CVE-2022-32821)\"", "creation_timestamp": "2023-01-05T15:08:19.000000Z"}, {"uuid": "4dec1e4d-6d91-4457-8e57-bc0dd13435af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-22640", "type": "seen", "source": "https://t.me/ashaburroyah313/187", "content": "{(D)enial(OFF)ensive(S)ervice[ToolKit]}-{by_(io=psy+/03c8.net)}\n\n===========================================================================\n\n[AI] Abducting target to extract interesting information... Be patient!\n\n======================\n\n -Target URL: https://hy.health.gov.il\n\n -IP    : 62.90.118.183\n -IPv6  : OFF\n -Port  : 443\n\n -Domain: hy.health.gov.il\n\n---------\n\nTrying single visit broadband test (using GET)...\n\n -Bytes in : 58.7 KB\n -Load time: 6.04 seconds\n\n---------\n\nDetermining webserver fingerprint (note that this value can be a fake)...\n\n -Banner: Microsoft-IIS/8.5\n -V\u00eda   : NOT found!\n\n---------\n\nSearching for extra Anti-DDoS protections...\n\n -WAF/IDS: FIREWALL NOT PRESENT (or not discovered yet)! ;-)\n\n---------\n\nSearching at CVE (https://cve.mitre.org) for vulnerabilities...\n\n -Last Reports:\n\n        + CVE-2022-35282 -&gt; https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35282\n\n        + CVE-2022-34336 -&gt; https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34336\n\n        + CVE-2022-34165 -&gt; https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34165\n\n        + CVE-2022-22670 -&gt; https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22670\n\n        + CVE-2022-22666 -&gt; https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22666\n\n        + CVE-2022-22654 -&gt; https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22654\n\n        + CVE-2022-22640 -&gt; https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22640\n\n        + CVE-2022-22638 -&gt; https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22638\n\n        + CVE-2022-22637 -&gt; https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637\n\n        + CVE-2022-22633 -&gt; https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22633\n\n---------\n\n[Info] [AI] Abduction finished! -&gt; [OK!]", "creation_timestamp": "2022-10-01T14:47:50.000000Z"}]}