{"vulnerability": "CVE-2022-4668", "sightings": [{"uuid": "318664ed-e268-426b-91cb-d4cae4d25096", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46689", "type": "seen", "source": "MISP/ab0b745f-bbd5-338e-8b92-97dd0c757e9d", "content": "", "creation_timestamp": "2025-08-31T03:01:01.000000Z"}, {"uuid": "58a43b7d-b544-4076-907f-973f8dade9f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46689", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:49.000000Z"}, {"uuid": "e67f3910-6529-4b28-b84c-64d95274d29f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46689", "type": "seen", "source": "https://gist.github.com/dlevi309/b29eb4b1bd684805c7f5de4136d133c8", "content": "", "creation_timestamp": "2025-04-20T02:30:28.000000Z"}, {"uuid": "0b273cee-92b7-416e-85ee-64496972df04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46689", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:45.000000Z"}, {"uuid": "c1c11700-1db6-4a71-9439-d1cc52a1bf91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46689", "type": "seen", "source": "https://gist.github.com/VLTNOgithub/bb9e33de94419c9c730db52571084066", "content": "", "creation_timestamp": "2025-09-04T20:23:50.000000Z"}, {"uuid": "3f9ab0c0-c650-4225-aa1d-3d20fc4cdb79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46689", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/osx/local/mac_dirty_cow.rb", "content": "", "creation_timestamp": "2023-02-02T18:03:09.000000Z"}, {"uuid": "4ccc4a4d-317d-4dcd-b1f0-f39b89814d77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46689", "type": "seen", "source": "https://gist.github.com/NightVibes3/781f6da990e1d6b23db8dce6e2cdf3e2", "content": "", "creation_timestamp": "2025-12-12T07:10:01.000000Z"}, {"uuid": "ed5b94a1-cd30-4a42-bfeb-f4bb312d670c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46689", "type": "seen", "source": "https://gist.github.com/michelepierini2-droid/5809ddd462250873656ec9738ef0a920", "content": "", "creation_timestamp": "2025-12-07T06:40:04.000000Z"}, {"uuid": "fb09e347-881d-4b47-8678-12705082b0c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46689", "type": "seen", "source": "https://gist.github.com/NightVibes3/82400a8a9060dd96eea708a8a2329318", "content": "", "creation_timestamp": "2026-02-02T16:44:13.000000Z"}, {"uuid": "e3b84399-e025-4534-83ae-a7d871e8df33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46689", "type": "seen", "source": "https://gist.github.com/NightVibes3/ef9075049410ea7d01baafa1ae186f97", "content": "", "creation_timestamp": "2025-12-12T07:18:14.000000Z"}, {"uuid": "9b315d1b-7dfa-4e7c-98c9-b99d5f1653c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46689", "type": "published-proof-of-concept", "source": "https://t.me/hackingshadow/2745", "content": "#TheShadowArmy\n\n#exploit\n1. CVE-2022-41050:\nA vulnerability in the MS Windows' User-Mode Printer Drivers\nhttps://ssd-disclosure.com/win32k-user-mode-printer-drivers-startdoc-uaf\n\n2. CVE-2022-46689:\nmacOS Dirty Cow bug\nhttps://github.com/zhuowei/MacDirtyCowDemo\n\n_-_-_-_-_-_- \u269cJOIN NOW \u269c -_-_-_-_-_-_\n \u274d\u274d\u274d \u2756 @HackingShadow \u2756 \u274d\u274d\u274d", "creation_timestamp": "2023-01-12T12:23:26.000000Z"}, {"uuid": "bef4c20b-e9e0-40d9-a4dc-8f39c56b1963", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46689", "type": "seen", "source": "https://gist.github.com/NightVibes3/771a99ff7c8bba3fe1d6024a94d94fed", "content": "", "creation_timestamp": "2025-12-14T22:47:58.000000Z"}, {"uuid": "8a36d643-3ecf-450f-a24f-1954529b21ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46689", "type": "seen", "source": "https://gist.github.com/NightVibes3/9bc2d9649e149e26f5dde51860f8e248", "content": "", "creation_timestamp": "2025-12-19T07:37:57.000000Z"}, {"uuid": "59248d11-cf4b-451f-ba7f-088f7dff279c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46689", "type": "seen", "source": "https://gist.github.com/NightVibes3/25a0e92ab855cc3946e1faabd9ab57cf", "content": "", "creation_timestamp": "2026-01-08T04:31:15.000000Z"}, {"uuid": "5531fa9f-d00c-402d-9c15-ff8ff6c0b138", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46689", "type": "seen", "source": "https://gist.github.com/NightVibes3/295b1a61dd88e5ccf3148e7cbdf06924", "content": "", "creation_timestamp": "2026-01-08T07:44:25.000000Z"}, {"uuid": "6a03fda7-d656-4eea-bba9-b1f8637e92e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46689", "type": "seen", "source": "https://gist.github.com/NightVibes3/222e2768e362f614f7f5cecfb0ae706c", "content": "", "creation_timestamp": "2026-01-08T09:53:20.000000Z"}, {"uuid": "2246cd03-fca9-45a2-80fe-756e8774efa0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46689", "type": "seen", "source": "https://gist.github.com/NightVibes3/6a3d8f0d193e37d88529338f05b5f3e6", "content": "", "creation_timestamp": "2026-01-08T10:03:28.000000Z"}, {"uuid": "b52667ed-cfd2-4272-b1b9-a66e60be69bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46689", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12698", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-46689\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A race condition was addressed with additional validation. This issue is fixed in tvOS 16.2, macOS Monterey 12.6.2, macOS Ventura 13.1, macOS Big Sur 11.7.2, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.2 and iPadOS 16.2, watchOS 9.2. An app may be able to execute arbitrary code with kernel privileges.\n\ud83d\udccf Published: 2022-12-15T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-21T15:21:15.921Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/HT213535\n2. https://support.apple.com/en-us/HT213532\n3. https://support.apple.com/en-us/HT213530\n4. https://support.apple.com/en-us/HT213531\n5. https://support.apple.com/en-us/HT213536\n6. https://support.apple.com/en-us/HT213534\n7. https://support.apple.com/en-us/HT213533\n8. http://seclists.org/fulldisclosure/2022/Dec/20\n9. http://seclists.org/fulldisclosure/2022/Dec/21\n10. http://seclists.org/fulldisclosure/2022/Dec/25\n11. http://seclists.org/fulldisclosure/2022/Dec/23\n12. http://seclists.org/fulldisclosure/2022/Dec/26\n13. http://seclists.org/fulldisclosure/2022/Dec/24\n14. http://seclists.org/fulldisclosure/2022/Dec/27", "creation_timestamp": "2025-04-21T16:03:06.000000Z"}, {"uuid": "4ee5a63c-13fe-4d36-8c97-c8ecd42fec28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46689", "type": "seen", "source": "Telegram/G-kx-DTDWfPOp5cJepg92j2e9E9yyQ0k9SVYaxiupb8kGRk", "content": "", "creation_timestamp": "2025-07-13T15:00:06.000000Z"}, {"uuid": "d17e29c0-a99e-480c-b6b7-29670db6c782", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46680", "type": "seen", "source": "Telegram/i7lHWW0DSQ8tHro8G_hLuMe_TvKI3qLEifcH0YA7-qzimxk", "content": "", "creation_timestamp": "2023-06-21T07:15:26.000000Z"}, {"uuid": "f9c03edd-7a35-4cf8-af04-0a7f4579d62d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46689", "type": "published-proof-of-concept", "source": "Telegram/0LxSJuadzx1gFt5LjOzQKudcVVss8Xi_oBXbI34BaDEWNfs", "content": "", "creation_timestamp": "2025-03-27T16:00:07.000000Z"}, {"uuid": "18b10de8-4a8c-4845-b922-99447b33c068", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46689", "type": "published-proof-of-concept", "source": "https://t.me/cKure/10556", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.\n\nhttps://github.com/zhuowei/MacDirtyCowDemo", "creation_timestamp": "2022-12-19T08:55:26.000000Z"}, {"uuid": "7e1f4271-8ef7-4802-8cc5-b2313f32615e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46689", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3615", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aGet root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.\nURL\uff1ahttps://github.com/Conradoduart3/Nft-Grabber-Stealer-Exploit-Cve-2022-Steal-BlockHain-Hack-Nft\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-12-22T04:51:26.000000Z"}, {"uuid": "08824c0b-c9b3-45ca-9d0f-6cc963aa565d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46689", "type": "seen", "source": "https://gist.github.com/fixedlook/e38d4cc35db8363303e906580d64d23b", "content": "", "creation_timestamp": "2026-04-25T22:27:51.000000Z"}, {"uuid": "998a0a60-ef36-407c-9823-f803772897e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46689", "type": "published-proof-of-concept", "source": "Telegram/VU7cdEj350As5nbBSxMaQrMuipi7XUOYnpvGVqbkeYiQTAI", "content": "", "creation_timestamp": "2025-07-24T15:00:06.000000Z"}, {"uuid": "dfb4413f-fbf3-4906-8351-2cb0f283f9aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46689", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3633", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aProof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.\nURL\uff1ahttps://github.com/zhuowei/WDBFontOverwrite\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-12-26T07:20:21.000000Z"}, {"uuid": "3c235dae-d574-43b2-aa4c-c95eb31a78b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46689", "type": "published-proof-of-concept", "source": "Telegram/suSVZ8gjh9CeURgOUMEZq2Z7fyo2iknJlY7RsYX9Hr2cvtw", "content": "", "creation_timestamp": "2023-01-20T07:08:40.000000Z"}, {"uuid": "a1935c9e-7c50-491c-97b0-fc3153689665", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46689", "type": "seen", "source": "https://t.me/arpsyndicate/705", "content": "#ExploitObserverAlert\n\nCVE-2022-46689\n\nDESCRIPTION: Exploit Observer has 60 entries related to CVE-2022-46689. A race condition was addressed with additional validation. This issue is fixed in tvOS 16.2, macOS Monterey 12.6.2, macOS Ventura 13.1, macOS Big Sur 11.7.2, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.2 and iPadOS 16.2, watchOS 9.2. An app may be able to execute arbitrary code with kernel privileges.\n\nFIRST-EPSS: 0.004520000\nNVD-IS: 5.9\nNVD-ES: 1.0", "creation_timestamp": "2023-11-29T09:00:11.000000Z"}, {"uuid": "ecc0c01f-7b39-4824-80da-120bdc5cb9dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46689", "type": "published-proof-of-concept", "source": "https://t.me/hackingshadow/2736", "content": "\ud83e\udd19Shizo is in touch!\n\ud83d\udca5I hope you didn't forget about Dirty COW(PoCs). Zhulwei has a new post about getting root in macOS 13.0.1 / 12.6.1 and below by exploiting CVE-2022-46689 (starting the binary, overwriting and starting over again). In fact, this is the equivalent of Dirty COW, only affecting macOS (XNU), instead of the Linux kernel, so the repository is called:\n\"MacDirtyCowDemo\" and Ian Beer (i41nbeer, \"former\" GCHQ employee, previous linked vulnerability here). The Apple security update says that an attacker exploiting this vulnerability can execute arbitrary code with kernel privileges and the race condition is prevented by new checks (as will be written below - they indirectly affect). Zhulwei began to analyze the vulnerability by analyzing a file in Apple XNU (vm_unaligned_copy_switch_race.c) and achieved a race condition (one thread switches memory between readonly and writable, and the second one tries to write data), allowing him to temporarily modify files in the /System volume (for saving changes after reboot, you need to run on a writable volume, all this is due to the Sealed System Volume).\n\nChzhulwei failed to achieve the execution of arbitrary code with kernel privileges and only managed to influence userspace processes. The disabling of password checking was achieved through recommendations for user authentication based on a policy located in /etc/pam.d (/etc/pam.d/login, pam_permit.so always allows access without authentication) and was introduced at Pwn2Own2020 and affected in a talk at Black Hat USA 2020 \"Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities\" and for convenience, a command line parameter was added that takes as an argument what needs to be overwritten.\n\nTo get root, you need to execute the following commands to download the repository and go to the directory with it:\n1\ufe0f\u20e3clang -o switcharoo vm_unaligned_copy_switch_race.c\n2\ufe0f\u20e3sed -e \"s/rootok/permit/g\" /etc/pam.d/su &gt; overwrite_file.bin\n3\ufe0f\u20e3./switcharoo /etc/pam.d/su overwrite_file.bin\n4\ufe0f\u20e3su\nAnd after executing the binary at step 3\ufe0f\u20e3, you should get the following output:\nTesting for 10 seconds...\nRO mapping was modified\nAnd after executing the su command in step 4\ufe0f\u20e3, access to the rooted shell will be obtained:\nsh-3.2#\n\nAmong other things:\n\ud83d\udcbeThere is another type of confusion in the unaligned write function in the XNU kernel:\nmach_vm_write(mach_task_self(), printf, printf, 0x8001);\nOf interest is the union vm_map_object:\nunion vm_map_object {\nvm_object_t vmo_object; /* object object */\nvm_map_t vmo_submap; /* belongs to another map */\n} vm_map_object_t;\nFor vm addresses in sharedcache, the first entry will be a nested map (submap)\nMoreover, VME_OBJECT just causes type confusion\nThat is, shared cache mapping in memory cannot be directly overwritten!\n\ud83d\udcbeDue to the fact that the submap does not own VM_PROT_WRITE, the patch leads to an early return (or the next dst_object = VME_OBJECT(entry) leads to panic), which, as it were, indirectly prevents type confusion, and in vm_map_copy_overwrite_nested this was already in the shortcut at:\nif (dst_end &lt;= entry-&gt;vme_end) {\n\u00a0\u00a0\u00a0\u00a0\u00a0 goto start_overwrite; /* you can prevent permission checks */\n}\n\ud83d\udcbevm_map_copy_overwrite_unaligned does not imply write check\n\ud83d\udcbeProbably, code signing (codesigning) and sandbox will prevent overwriting. Since the whole process dies if an incorrect signature is submitted, and re-checking the codesignature on the page is quite a hindrance.\n\n\u26a0\ufe0fSo if the subscriber uses apple products, update (the vulnerability was patched in:\niOS 16.2 and iPadOS 16.2, iOS 15.7.2 and iPadOS 15.7.2, macOS 13.1, macOS 12.6.2, macOS 11.7.2, tvOS 16.2, watchOS 9.2)!\n\n#macOS #XNU #vulnerability #exploitation #security #DirtyCOW #MacDirtyCow #root #su", "creation_timestamp": "2022-12-18T04:04:21.000000Z"}, {"uuid": "027c8fe0-f039-4d2e-b529-c8ee12fde585", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46689", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/1229", "content": "MacDirtyCowDem\n\u041f\u043e\u043b\u0443\u0447\u0430\u0435\u043c root \u0432  macOS 13.0.1 \u0447\u0435\u0440\u0435\u0437 CVE-2022-46689\nexploit\n\n\n\n#root #macos #exploit", "creation_timestamp": "2022-12-18T11:46:29.000000Z"}, {"uuid": "8c629744-56bb-48d1-8314-9b79f114c2d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46689", "type": "published-proof-of-concept", "source": "Telegram/XeGWMxPo2XivsWnPanq9-IRzv4Yms3WPUVXM00Wck1qh2vg", "content": "", "creation_timestamp": "2023-01-05T04:29:05.000000Z"}, {"uuid": "ac257beb-b2e4-4890-8260-f21e63bbdd8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46680", "type": "seen", "source": "https://t.me/cibsecurity/64538", "content": "\u203c CVE-2022-46680 \u203c\n\nA CWE-319: Cleartext transmission of sensitive information vulnerability exists that couldcause disclosure of sensitive information, denial of service, or modification of data if an attackeris able to intercept network traffic.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-22T23:43:59.000000Z"}, {"uuid": "937998ce-df96-46ee-b1d3-c9c72d539635", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46689", "type": "published-proof-of-concept", "source": "https://t.me/ZeroDay_TM/708", "content": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.\n\nhttps://github.com/zhuowei/WDBFontOverwrite\n\n- - - - - - - - - - - - - - - - - - - -\n-=[ @ZeroDay_TM ]=-", "creation_timestamp": "2023-01-27T14:05:19.000000Z"}, {"uuid": "f4d2dbb4-71db-4b48-b92e-9cf93963a5fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46689", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/1850", "content": "#exploit\n1. CVE-2022-41050:\nA vulnerability in the MS Windows' User-Mode Printer Drivers\nhttps://ssd-disclosure.com/win32k-user-mode-printer-drivers-startdoc-uaf\n\n2. CVE-2022-46689:\nmacOS Dirty Cow bug\nhttps://github.com/zhuowei/MacDirtyCowDemo", "creation_timestamp": "2022-12-18T11:59:52.000000Z"}, {"uuid": "8dc6a3d0-bd0c-4bb9-bd6e-3cdb17506b51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46689", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7381", "content": "#exploit\n1. CVE-2022-41050:\nA vulnerability in the MS Windows' User-Mode Printer Drivers\nhttps://ssd-disclosure.com/win32k-user-mode-printer-drivers-startdoc-uaf\n\n2. CVE-2022-46689:\nmacOS Dirty Cow bug\nhttps://github.com/zhuowei/MacDirtyCowDemo\n\n3. CVE-2022-39198:\nApache Dubbo Hession Deserialization Vulnerability Gadgets Bypass\nhttps://xz.aliyun.com/t/11961", "creation_timestamp": "2022-12-18T20:23:10.000000Z"}, {"uuid": "08e89ef0-b2b2-40f7-a53d-9d96a2c86d87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46689", "type": "published-proof-of-concept", "source": "https://t.me/LearnExploit/4441", "content": "Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug)\n\nGithub \n\n#CVE #macOS \n\u2014\u2014\u2014\u2014\u2014\u2014\n0Day.Today\n@LearnExploit\n@Tech_Army", "creation_timestamp": "2023-01-04T10:02:39.000000Z"}, {"uuid": "b680486a-7280-493b-9e2d-7d9803c2e7b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46689", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/2567", "content": "#CVE-2022\nProof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.\nhttps://github.com/zhuowei/WDBFontOverwrite\n\nThis repo contains payload for the CVE-2022-36067\nhttps://github.com/Prathamrajgor/Exploit-For-CVE-2022-36067\n\nProof of concept for CVE-2022-30190 (Follina).\n\nhttps://github.com/winstxnhdw/CVE-2022-30190\n\n@BlueRedTeam", "creation_timestamp": "2023-01-21T16:19:17.000000Z"}, {"uuid": "32b2f7de-7871-4606-b261-6ef6cf7700d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46689", "type": "seen", "source": "https://t.me/BlueRedTeam/2556", "content": "#CVE-2022\n7-Zip CVE-2022-29072 Mitigation - CHM file - This script detects if the .chm file exists and removes it.\n\nhttps://github.com/Phantomiman/7-Zip.chm-mitigiation\n\n#CVE-2022\nPoC for Acronis Arbitrary File Read - CVE-2022-45451\nhttps://github.com/alfarom256/CVE-2022-45451\n\n#webshell\nwebshell alfa php\n\nhttps://github.com/xstro04002/alfa-shell\n\nCVE-2022-25765 pdfkit &lt;0.8.6 command injection.\n\nhttps://github.com/shamo0/PDFkit-CMD-Injection\n\nGet root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.\n\nhttps://github.com/Conradoduart3/Nft-Grabber-Stealer-Exploit-Cve-2022-Steal-BlockHain-Hack-Nft\n\n@BlueRedTeam", "creation_timestamp": "2023-01-10T19:38:54.000000Z"}]}