{"uuid": "b52667ed-cfd2-4272-b1b9-a66e60be69bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46689", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12698", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-46689\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A race condition was addressed with additional validation. This issue is fixed in tvOS 16.2, macOS Monterey 12.6.2, macOS Ventura 13.1, macOS Big Sur 11.7.2, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.2 and iPadOS 16.2, watchOS 9.2. An app may be able to execute arbitrary code with kernel privileges.\n\ud83d\udccf Published: 2022-12-15T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-21T15:21:15.921Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/HT213535\n2. https://support.apple.com/en-us/HT213532\n3. https://support.apple.com/en-us/HT213530\n4. https://support.apple.com/en-us/HT213531\n5. https://support.apple.com/en-us/HT213536\n6. https://support.apple.com/en-us/HT213534\n7. https://support.apple.com/en-us/HT213533\n8. http://seclists.org/fulldisclosure/2022/Dec/20\n9. http://seclists.org/fulldisclosure/2022/Dec/21\n10. http://seclists.org/fulldisclosure/2022/Dec/25\n11. http://seclists.org/fulldisclosure/2022/Dec/23\n12. http://seclists.org/fulldisclosure/2022/Dec/26\n13. http://seclists.org/fulldisclosure/2022/Dec/24\n14. http://seclists.org/fulldisclosure/2022/Dec/27", "creation_timestamp": "2025-04-21T16:03:06.000000Z"}