{"vulnerability": "CVE-2022-4283", "sightings": [{"uuid": "cb4adbd0-d44e-4da2-bd33-e4926c58326c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42831", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12721", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-42831\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A race condition was addressed with improved locking. This issue is fixed in iOS 16.1 and iPadOS 16, macOS Ventura 13. An app with root privileges may be able to execute arbitrary code with kernel privileges.\n\ud83d\udccf Published: 2022-11-01T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-21T17:07:09.718Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/HT213488\n2. https://support.apple.com/en-us/HT213489", "creation_timestamp": "2025-04-21T18:02:42.000000Z"}, {"uuid": "67cd822e-fe2a-45c9-836b-508cc2e48230", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4283", "type": "seen", "source": "https://t.me/cibsecurity/54570", "content": "\u203c CVE-2022-4283 \u203c\n\nA vulnerability was found in X.Org. This security flaw occurs because the XkbCopyNames function left a dangling pointer to freed memory, resulting in out-of-bounds memory access on subsequent XkbGetKbdByName requests.. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-15T00:23:04.000000Z"}, {"uuid": "bfff5d1b-fcf3-445b-ae25-42ddb35d5645", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42832", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12723", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-42832\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A race condition was addressed with improved locking. This issue is fixed in iOS 16.1 and iPadOS 16, macOS Ventura 13. An app with root privileges may be able to execute arbitrary code with kernel privileges.\n\ud83d\udccf Published: 2022-11-01T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-21T17:03:40.998Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/HT213488\n2. https://support.apple.com/en-us/HT213489", "creation_timestamp": "2025-04-21T18:02:44.000000Z"}, {"uuid": "567eb598-7916-4221-846a-0f022e19f1f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42837", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12724", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-42837\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue existed in the parsing of URLs. This issue was addressed with improved input validation. This issue is fixed in iOS 16.2 and iPadOS 16.2, macOS Ventura 13.1, iOS 15.7.2 and iPadOS 15.7.2, watchOS 9.2. A remote user may be able to cause unexpected app termination or arbitrary code execution.\n\ud83d\udccf Published: 2022-12-15T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-21T17:00:52.255Z\n\ud83d\udd17 References:\n1. https://support.apple.com/kb/HT213535\n2. https://support.apple.com/en-us/HT213532\n3. https://support.apple.com/en-us/HT213530\n4. https://support.apple.com/en-us/HT213531\n5. https://support.apple.com/en-us/HT213536\n6. http://seclists.org/fulldisclosure/2022/Dec/20\n7. http://seclists.org/fulldisclosure/2022/Dec/21\n8. http://seclists.org/fulldisclosure/2022/Dec/23\n9. http://seclists.org/fulldisclosure/2022/Dec/27", "creation_timestamp": "2025-04-21T18:02:46.000000Z"}, {"uuid": "0f53731c-197e-4c6b-91c4-b326becb9984", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42830", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12718", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-42830\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The issue was addressed with improved memory handling. This issue is fixed in iOS 16.1 and iPadOS 16, macOS Ventura 13. An app with root privileges may be able to execute arbitrary code with kernel privileges.\n\ud83d\udccf Published: 2022-11-01T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-21T17:14:58.195Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/HT213488\n2. https://support.apple.com/en-us/HT213489", "creation_timestamp": "2025-04-21T18:02:38.000000Z"}, {"uuid": "a4f2b592-b68a-48c8-bdab-a964cbf5ad40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42839", "type": "seen", "source": "https://t.me/ctinow/175796", "content": "https://ift.tt/zetDXs0\nCVE-2022-42839 | Apple macOS App information disclosure", "creation_timestamp": "2024-01-30T10:11:42.000000Z"}, {"uuid": "d40dbd5b-ffad-4159-a2ba-d7df116537fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42839", "type": "seen", "source": "https://t.me/ctinow/175787", "content": "https://ift.tt/YlrLtAp\nCVE-2022-42839 | Apple iOS/iPadOS App information disclosure", "creation_timestamp": "2024-01-30T09:41:45.000000Z"}, {"uuid": "40dd323c-63fa-4a2f-847b-b01e3a27aff9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42834", "type": "seen", "source": "https://t.me/cibsecurity/65480", "content": "\u203c CVE-2022-42834 \u203c\n\nAn access issue was addressed with improved access restrictions. This issue is fixed in macOS Monterey 12.6.3, macOS Ventura 13, macOS Big Sur 11.7.3. An app may be able to access mail folder attachments through a temporary directory used during compression\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-23T22:33:45.000000Z"}, {"uuid": "89138c0b-dcd1-40e1-9a50-973710df755f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42837", "type": "seen", "source": "https://t.me/cibsecurity/54630", "content": "\u203c CVE-2022-42837 \u203c\n\nAn issue existed in the parsing of URLs. This issue was addressed with improved input validation. This issue is fixed in iOS 16.2 and iPadOS 16.2, macOS Ventura 13.1, iOS 15.7.2 and iPadOS 15.7.2, watchOS 9.2. A remote user may be able to cause unexpected app termination or arbitrary code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-15T22:29:53.000000Z"}, {"uuid": "20015b7d-fbb5-409e-85d9-edfc3ae4c260", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42831", "type": "seen", "source": "https://t.me/cibsecurity/52424", "content": "\u203c CVE-2022-42831 \u203c\n\nA race condition was addressed with improved locking. This issue is fixed in iOS 16.1 and iPadOS 16, macOS Ventura 13. An app with root privileges may be able to execute arbitrary code with kernel privileges.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-01T23:23:43.000000Z"}]}