{"vulnerability": "CVE-2022-2261", "sightings": [{"uuid": "266ce2e8-ade9-4f33-9e78-44b103a99cba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22616", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:45.000000Z"}, {"uuid": "c31197be-1ed6-43fd-8072-c90ab2740ee5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22616", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:43.000000Z"}, {"uuid": "f629e83d-c7b2-4aec-bfef-6e47da4ea01f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22616", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/osx/browser/osx_gatekeeper_bypass.rb", "content": "", "creation_timestamp": "2021-05-07T14:18:11.000000Z"}, {"uuid": "21f1e242-9440-4074-8c41-c22acefd58bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22611", "type": "seen", "source": "https://gist.github.com/alon710/325f8e1b40ecea99be8151b391c88d88", "content": "", "creation_timestamp": "2026-01-24T21:26:33.000000Z"}, {"uuid": "7d354590-06c2-40d4-94e5-c34a78405b6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22611", "type": "seen", "source": "https://gist.github.com/alon710/ae00337f1e0846f45fb2c7e9268320cf", "content": "", "creation_timestamp": "2026-01-24T22:41:56.000000Z"}, {"uuid": "6d0ddc68-18d5-42ef-b262-dfbfa1a816a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22616", "type": "seen", "source": "https://t.me/proxy_bar/1248", "content": "\u041a\u043e\u043b\u043b\u0435\u043a\u0446\u0438\u044f Exploits - MacOS\n*\nCVE-2022-22583\nCVE-2022-22616\nCVE-2022-22639\nCVE-2022-26690\nCVE-2022-26712\nCVE-2022-26728\nCVE-2022-32786\nCVE-2022-32800\n*\ndownload\n\n#exploit #macOS", "creation_timestamp": "2022-12-27T14:07:57.000000Z"}, {"uuid": "2edd2524-3839-40b6-9b3b-228df2afd492", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22616", "type": "published-proof-of-concept", "source": "Telegram/m2MEtejkEp4yOpntKii6ucLVNNthGc7DTbm8HilSEZO0Ako", "content": "", "creation_timestamp": "2023-02-04T17:02:30.000000Z"}, {"uuid": "acf42730-923d-4500-b427-7aebf1f324bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22616", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/5619", "content": "#Red_Team_Tactics\n1. Browser In The Browser (BITB) Attack\nhttps://mrd0x.com/browser-in-the-browser-phishing-attack\n2. Simple way to bypass GateKeeper (CVE-2022-22616)\nhttps://jhftss.github.io/CVE-2022-22616-Gatekeeper-Bypass", "creation_timestamp": "2022-03-17T11:07:01.000000Z"}, {"uuid": "d3ba0e0a-586a-4c67-af9e-0651f10a3c5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22616", "type": "published-proof-of-concept", "source": "Telegram/aOf_rbDrwIUidyWTOY_j25ydnl1rugPysH4L_dx_8LcxgtM", "content": "", "creation_timestamp": "2023-01-04T11:11:04.000000Z"}, {"uuid": "b29a38c6-e677-4744-ae73-05b9cc1e9210", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22616", "type": "published-proof-of-concept", "source": "Telegram/y9riWSybSxM5iM9MBxLXE1DhDytPghMHh8g33kHWQzIo-7c", "content": "", "creation_timestamp": "2023-01-29T13:21:42.000000Z"}, {"uuid": "c3ef2130-f3a7-4232-801f-bfd689836e81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22616", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/2514", "content": "CVE-2022-22583 CVE-2022-22616 CVE-2022-22639 CVE-2022-26690 CVE-2022-26712 CVE-2022-26728 CVE-2022-32786 CVE-2022-32800\n\nhttps://github.com/jhftss/POC", "creation_timestamp": "2023-02-04T11:10:12.000000Z"}, {"uuid": "6de14417-d131-43b3-92bc-d3f75e53fd1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22611", "type": "seen", "source": "https://t.me/true_secator/2732", "content": "\u041f\u043e\u0440\u0446\u0438\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u043e\u0442 Apple \u0432\u044b\u0448\u043b\u0430 \u0432 \u043f\u043e\u043d\u0435\u0434\u0435\u043b\u044c\u043d\u0438\u043a \u0441 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c \u043a\u0430\u043a \u043c\u0438\u043d\u0438\u043c\u0443\u043c 39 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043d\u0430 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430\u0445 iOS/iPadOS.\n\n\u041f\u0440\u0438\u0447\u0435\u043c \u0432 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u044e\u0442, \u0447\u0442\u043e \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0438\u0437 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u0430\u044e\u0442 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0430\u0442\u0430\u043a\u0430\u043c \u0441 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435\u043c \u043a\u043e\u0434\u0430, \u0435\u0441\u043b\u0438 \u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c iPhone \u043e\u0442\u043a\u0440\u043e\u0435\u0442 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u0444\u0430\u0439\u043b PDF \u0438\u043b\u0438 \u043f\u0440\u043e\u0441\u043c\u043e\u0442\u0440\u0438\u0442 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u0432\u0435\u0431-\u043a\u043e\u043d\u0442\u0435\u043d\u0442.\n\n\u0412 \u0434\u043e\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043a \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u044b\u043c \u0434\u0435\u0432\u0430\u0439\u0441\u0430\u043c Apple \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f macOS (\u0432\u043a\u043b\u044e\u0447\u0430\u044f Catalina, Big Sur, Monterey), tvOS, WatchOS, iTunes \u0438 Xcode.\n\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044b\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 iOS 15.4 \u0438 iPadOS 15.4 \u0440\u0435\u0448\u0430\u044e\u0442 \u043c\u043d\u043e\u0433\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u044b\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0441 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c\u044e \u043f\u0430\u043c\u044f\u0442\u0438 \u0432 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u0438\u0445 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430\u0445 \u041e\u0421, \u0432\u043a\u043b\u044e\u0447\u0430\u044f Accelerate Framework, \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0439 ImageIO \u0438 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c \u0440\u0435\u043d\u0434\u0435\u0440\u0438\u043d\u0433\u0430 WebKit.\n\n\u041d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u043c\u0438 \u0438\u0437 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u044f\u0432\u043b\u044f\u044e\u0442\u0441\u044f CVE-2022-22633 (Accelerate Framework), CVE-2022-22611 (ImageIO), CVE-2022-22610 (WebKit), CVE-2022-22624 \u0438 CVE- 2022-22628 \u043a\u0430\u0436\u0434\u0430\u044f \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043c\u043e\u0433\u043b\u0430 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430.\n\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f iOS \u0438 iPadOS \u0442\u0430\u043a\u0436\u0435 \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u044e\u0442 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0438 \u043f\u043e\u0432\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u044f \u043f\u0430\u043c\u044f\u0442\u0438 \u0432 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430\u0445 \u041e\u0421, \u0432\u043a\u043b\u044e\u0447\u0430\u044f AVEVideoEncoder, CoreMedia, FaceTime, \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u044b \u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u043e\u0433\u043e \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u0430, iTunes, \u044f\u0434\u0440\u0435, Sandbox, Siri \u0438 \u041f\u041e \u0434\u043b\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f.", "creation_timestamp": "2022-03-15T15:50:00.000000Z"}, {"uuid": "5df33e81-cbeb-40fc-a79f-8de0c95e3e17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-2261", "type": "seen", "source": "https://t.me/cibsecurity/48995", "content": "\u203c CVE-2022-2261 \u203c\n\nThe WPIDE WordPress plugin before 3.0 does not sanitize and validate the filename parameter before using it in a require statement in the admin dashboard, leading to a Local File Inclusion issue.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-29T22:34:18.000000Z"}, {"uuid": "b405e817-f187-48a5-96a7-a5e24b459833", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22610", "type": "seen", "source": "https://t.me/cibsecurity/50415", "content": "\u203c CVE-2022-22610 \u203c\n\nA memory corruption issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iOS 15.4 and iPadOS 15.4, tvOS 15.4. Processing maliciously crafted web content may lead to code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-23T22:27:09.000000Z"}, {"uuid": "ef4afff1-c5cf-4a27-ab55-0e534f813a4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22618", "type": "seen", "source": "https://t.me/cibsecurity/39222", "content": "\u203c CVE-2022-22618 \u203c\n\nThis issue was addressed with improved checks. This issue is fixed in watchOS 8.5, iOS 15.4 and iPadOS 15.4. A user may be able to bypass the Emergency SOS passcode prompt.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-18T21:22:50.000000Z"}, {"uuid": "ee47695a-1784-4300-bdca-5f1d6cf78b25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22617", "type": "seen", "source": "https://t.me/cibsecurity/39219", "content": "\u203c CVE-2022-22617 \u203c\n\nA logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.6.5, macOS Monterey 12.3, Security Update 2022-003 Catalina. An application may be able to gain elevated privileges.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-18T21:22:46.000000Z"}, {"uuid": "bf88a99c-12c2-4cd2-8f15-caa4b868cc29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22611", "type": "seen", "source": "https://t.me/cibsecurity/39218", "content": "\u203c CVE-2022-22611 \u203c\n\nAn out-of-bounds read was addressed with improved input validation. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4, iTunes 12.12.3 for Windows, watchOS 8.5, macOS Monterey 12.3. Processing a maliciously crafted image may lead to arbitrary code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-18T21:22:44.000000Z"}, {"uuid": "1b7ecf5b-1773-4371-9847-fae864a3c765", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22616", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/1809", "content": "#Red_Team\n1. Browser In The Browser (BITB) Attack\nhttps://mrd0x.com/browser-in-the-browser-phishing-attack\n2. Simple way to bypass GateKeeper (CVE-2022-22616)\nhttps://jhftss.github.io/CVE-2022-22616-Gatekeeper-Bypass\n\n@BlueRedTeam", "creation_timestamp": "2022-03-17T08:19:01.000000Z"}, {"uuid": "56a1e821-87c1-48c5-80a2-a083a3a4f078", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22610", "type": "seen", "source": "https://t.me/true_secator/2732", "content": "\u041f\u043e\u0440\u0446\u0438\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u043e\u0442 Apple \u0432\u044b\u0448\u043b\u0430 \u0432 \u043f\u043e\u043d\u0435\u0434\u0435\u043b\u044c\u043d\u0438\u043a \u0441 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c \u043a\u0430\u043a \u043c\u0438\u043d\u0438\u043c\u0443\u043c 39 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043d\u0430 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430\u0445 iOS/iPadOS.\n\n\u041f\u0440\u0438\u0447\u0435\u043c \u0432 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u044e\u0442, \u0447\u0442\u043e \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0438\u0437 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u0430\u044e\u0442 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0430\u0442\u0430\u043a\u0430\u043c \u0441 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435\u043c \u043a\u043e\u0434\u0430, \u0435\u0441\u043b\u0438 \u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c iPhone \u043e\u0442\u043a\u0440\u043e\u0435\u0442 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u0444\u0430\u0439\u043b PDF \u0438\u043b\u0438 \u043f\u0440\u043e\u0441\u043c\u043e\u0442\u0440\u0438\u0442 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u0432\u0435\u0431-\u043a\u043e\u043d\u0442\u0435\u043d\u0442.\n\n\u0412 \u0434\u043e\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043a \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u044b\u043c \u0434\u0435\u0432\u0430\u0439\u0441\u0430\u043c Apple \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f macOS (\u0432\u043a\u043b\u044e\u0447\u0430\u044f Catalina, Big Sur, Monterey), tvOS, WatchOS, iTunes \u0438 Xcode.\n\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044b\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 iOS 15.4 \u0438 iPadOS 15.4 \u0440\u0435\u0448\u0430\u044e\u0442 \u043c\u043d\u043e\u0433\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u044b\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0441 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c\u044e \u043f\u0430\u043c\u044f\u0442\u0438 \u0432 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u0438\u0445 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430\u0445 \u041e\u0421, \u0432\u043a\u043b\u044e\u0447\u0430\u044f Accelerate Framework, \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0439 ImageIO \u0438 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c \u0440\u0435\u043d\u0434\u0435\u0440\u0438\u043d\u0433\u0430 WebKit.\n\n\u041d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u043c\u0438 \u0438\u0437 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u044f\u0432\u043b\u044f\u044e\u0442\u0441\u044f CVE-2022-22633 (Accelerate Framework), CVE-2022-22611 (ImageIO), CVE-2022-22610 (WebKit), CVE-2022-22624 \u0438 CVE- 2022-22628 \u043a\u0430\u0436\u0434\u0430\u044f \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043c\u043e\u0433\u043b\u0430 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430.\n\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f iOS \u0438 iPadOS \u0442\u0430\u043a\u0436\u0435 \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u044e\u0442 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0438 \u043f\u043e\u0432\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u044f \u043f\u0430\u043c\u044f\u0442\u0438 \u0432 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430\u0445 \u041e\u0421, \u0432\u043a\u043b\u044e\u0447\u0430\u044f AVEVideoEncoder, CoreMedia, FaceTime, \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u044b \u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u043e\u0433\u043e \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u0430, iTunes, \u044f\u0434\u0440\u0435, Sandbox, Siri \u0438 \u041f\u041e \u0434\u043b\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f.", "creation_timestamp": "2022-03-15T15:50:00.000000Z"}, {"uuid": "dcf2aff2-9252-4ced-922d-e5fe1505820c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22616", "type": "seen", "source": "https://t.me/cibsecurity/43426", "content": "\u203c CVE-2022-22616 \u203c\n\nThis issue was addressed with improved checks. This issue is fixed in Security Update 2022-003 Catalina, macOS Monterey 12.3, macOS Big Sur 11.6.5. A maliciously crafted ZIP archive may bypass Gatekeeper checks.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-26T22:14:34.000000Z"}]}