{"vulnerability": "CVE-2022-4345", "sightings": [{"uuid": "6b67812c-c47f-4174-a106-8129114c10e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43450", "type": "seen", "source": "https://t.me/ctinow/156980", "content": "https://ift.tt/bUn7Qqh\nCVE-2022-43450", "creation_timestamp": "2023-12-20T13:53:11.000000Z"}, {"uuid": "b0caace6-16d0-4e70-b635-6dd6dfc86b20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43454", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lk2qmofozb2h", "content": "", "creation_timestamp": "2025-03-10T23:51:08.044867Z"}, {"uuid": "0b73e317-b854-4a51-ab01-b09912156884", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43454", "type": "seen", "source": "https://t.me/cvedetector/19988", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-43454 - Apple macOS Ventura Arbitrary Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2022-43454 \nPublished : March 10, 2025, 8:15 p.m. | 1\u00a0hour, 17\u00a0minutes ago \nDescription : A double free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13.1, watchOS 9.2, iOS 16.2 and iPadOS 16.2, tvOS 16.2. An app may be able to execute arbitrary code with kernel privileges. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-10T23:13:42.000000Z"}, {"uuid": "6d9a6d8b-14e1-4d4c-8974-302946e0e7cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43454", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7053", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43454\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A double free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13.1, watchOS 9.2, iOS 16.2 and iPadOS 16.2, tvOS 16.2. An app may be able to execute arbitrary code with kernel privileges.\n\ud83d\udccf Published: 2025-03-10T19:37:48.138Z\n\ud83d\udccf Modified: 2025-03-10T19:37:48.138Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/102808\n2. https://support.apple.com/en-us/102741\n3. https://support.apple.com/en-us/102807\n4. https://support.apple.com/en-us/102836", "creation_timestamp": "2025-03-10T20:38:59.000000Z"}, {"uuid": "ac89aaa5-04c5-4e27-a0c2-348de63d37c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43454", "type": "seen", "source": "Telegram/zah4gvXZHMhpSEP1Zenn8ux7dYMJ-s-XuU83eO3gq2vO-sOh", "content": "", "creation_timestamp": "2025-03-11T04:41:13.000000Z"}, {"uuid": "26b26a8c-fd91-44f6-b15f-76dee9448d27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4345", "type": "seen", "source": "https://t.me/cibsecurity/56413", "content": "\u203c CVE-2022-4345 \u203c\n\nInfinite loops in the BPv6, OpenFlow, and Kafka protocol dissectors in Wireshark 4.0.0 to 4.0.1 and 3.6.0 to 3.6.9 allows denial of service via packet injection or crafted capture file\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-12T07:30:06.000000Z"}, {"uuid": "c79e8c64-6b93-423e-9bc9-0a1c419d84bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43459", "type": "seen", "source": "https://t.me/cibsecurity/59092", "content": "\u203c CVE-2022-43459 \u203c\n\nCross-Site Request Forgery (CSRF) vulnerability in Forms by CaptainForm \u00e2\u20ac\u201c Form Builder for WordPress plugin &lt;= 2.5.3 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-28T16:29:15.000000Z"}, {"uuid": "36717025-b7f2-4cf5-ad36-15066b906aaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43454", "type": "seen", "source": "Telegram/hsgApaeX6IlGA08gwEFcWpiOrIbzc7mmOCF5lgmxgIVmOg1z", "content": "", "creation_timestamp": "2025-03-11T04:41:14.000000Z"}, {"uuid": "4ddcd800-b428-458f-978e-89b2926aa878", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43451", "type": "seen", "source": "https://t.me/cibsecurity/52548", "content": "\u203c CVE-2022-43451 \u203c\n\nOpenHarmony-v3.1.2 and prior versions had an Multiple path traversal vulnerability in appspawn and nwebspawn services. Local attackers can create arbitrary directories or escape application sandbox.If chained with other vulnerabilities it would allow an unprivileged process to gain full root privileges.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-03T23:26:13.000000Z"}]}