{"vulnerability": "CVE-2022-26763", "sightings": [{"uuid": "fb717dfe-ef22-4848-818d-96d9ee9e652b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26763", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/848", "content": "Updates On Hackbyte Forum:-\n\n\ud83d\udcccLeman2 Leak\n\ud83d\udccc26M ESKIMI.COM DATABASE\n\ud83d\udcccEtisalcom Bahrain Telecom Bahrain\n\ud83d\udcccLock Screen Bypass Exploit of Android Devices (CVE-2022\u201320006)\n\ud83d\udcccSonarQube_Data_Center\n\ud83d\udcccProton_Privacy_Decoded: Script to Explore ProtonMail and Vpn\n\ud83d\udcccRandy: A pre-authenticated RCE exploit for Inductive Automation Ignition\n\ud83d\udcccOnionWallet Leak\n\ud83d\udcccUAC bypass for x64 Windows 7 \u2013 11\n\ud83d\udcccDecompiler Explorer! Compare tools on the forefront of static analysis, now in your web browser!\n\ud83d\udcccAbuse Cloudflare Zerotrust for C2 channels\n\ud83d\udcccCobaltstrike_all_kits\n\ud83d\udcccBypass Windows Defender by utilizing malicious SMB requests inside MS Word Macro\n\ud83d\udcccHTB Business CTF 2022: Dirty Money\n\ud83d\udcccLEAK WORK.UA\n\ud83d\udcccTurniketov.net Leak\n\ud83d\udcccVK.com Leak 2022\n\ud83d\udcccKuban 1k b2b Leak\n\ud83d\udccc9k_doc_fr_selfie Kyc Leak\n\ud83d\udcccIDA Plugin to reconstruct .proto files used in the analyzed binary\n\ud83d\udcccLDAP shell\n\ud83d\udcccHiddenCPG - a vulnerable clone detection system\n\ud83d\udcccInvestigator - An online handy-recon tool.\n\ud83d\udcccBFAC - Burp Extension for BFAC (Advanced Backup-File Artifacts Testing for Web-Applications)\n\ud83d\udcccReoSploit - A Tool that Finds, Enumerates, and #exploits Reolink Cameras.\n\ud83d\udcccElectroMagnetic Mining Array (EMMA)\n\ud83d\udcccblindssl - Disable SSL certificate verification using eBPF\n\ud83d\udcccPCICrash - PCIDriverKit PoC for CVE-2022-26763 (exec arbitrary code w/ system privileges).\n\ud83d\udcccAntares - Cross-platform #SQL client.\n\ud83d\udcccFAME - Recursive acronym meaning \u201cFAME Automates Malware Evaluation\u201d.\n\ud83d\udcccActive Directory Attacks\n\ud83d\udcccCVE-2022-22047: Windows CSRSS Elevation of Privilege Zero-Day Vulnerability.\n\ud83d\udcccAccount hijacking using \u201cdirty dancing\u201d in sign-in OAuth-flows\n\n\ud83d\udc49\ud83c\udffb\ud83d\udc49\ud83c\udffb Updates:- https://bit.ly/3yRyah3 \ud83d\udc48\ud83c\udffb\ud83d\udc48\ud83c\udffb", "creation_timestamp": "2022-07-17T22:52:10.000000Z"}, {"uuid": "89cc198f-7162-43ed-a9af-39a3633c9409", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26763", "type": "published-proof-of-concept", "source": "https://t.me/apexhacks/95", "content": "PCIDriverKit proof-of-concept for CVE-2022-26763", "creation_timestamp": "2022-07-06T18:40:57.000000Z"}, {"uuid": "8432a1cc-439a-424d-ab5c-d23a08dfd132", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26763", "type": "published-proof-of-concept", "source": "https://t.me/apexhacks/93", "content": "\ud83d\udda5Get root on macOS 12.3.1: proof-of-concepts for Linus Henze's CoreTrust and DriverKit bugs (CVE-2022-26766, CVE-2022-26763)", "creation_timestamp": "2022-07-06T18:40:57.000000Z"}, {"uuid": "fb7799e1-eab8-4d23-a6b4-6ea18f4a0879", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26763", "type": "published-proof-of-concept", "source": "Telegram/V3_8N6ZUWQ9rL5z501KvYGFV3sn8qhA78QOreSFS4fpoDQ", "content": "", "creation_timestamp": "2022-07-17T08:53:31.000000Z"}, {"uuid": "6a9c800c-28e3-4bcb-916e-707eedb1e25a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26763", "type": "seen", "source": "https://t.me/cibsecurity/43451", "content": "\u203c CVE-2022-26763 \u203c\n\nAn out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, Security Update 2022-004 Catalina, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.4. A malicious application may be able to execute arbitrary code with system privileges.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-27T00:14:32.000000Z"}, {"uuid": "f05b336a-aa40-4a69-9f19-3cf221e149c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26763", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/6332", "content": "#exploit\nGet root on macOS 12.3.1:\nProof-of-concepts for Linus Henze's CoreTrust and DriverKit bugs (CVE-2022-26766, CVE-2022-26763)\nhttps://worthdoingbadly.com/coretrust", "creation_timestamp": "2022-07-04T11:00:13.000000Z"}]}