Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2022-22620

Description

A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.2.1, iOS 15.3.1 and iPadOS 15.3.1, Safari 15.3 (v. 16612.4.9.1.8 and 15612.4.9.1.8). Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..

POC

Reference

No PoCs from references.

Github

- https://github.com/ARPSyndicate/cvemon

- https://github.com/NaInSec/CVE-PoC-in-GitHub

- https://github.com/Ostorlab/KEV

- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors

- https://github.com/SYRTI/POC_to_review

- https://github.com/WhooAmii/POC_to_review

- https://github.com/bb33bb/dkjiayu.github.io

- https://github.com/bekahen/9.00

- https://github.com/bekahen/900

- https://github.com/bex19/900

- https://github.com/dkjiayu/dkjiayu.github.io

- https://github.com/k0mi-tg/CVE-POC

- https://github.com/kmeps4/CVE-2022-22620

- https://github.com/kmeps4/PSFree

- https://github.com/manas3c/CVE-POC

- https://github.com/minaadel551/PS4Free

- https://github.com/minaadel551/test

- https://github.com/minaadel551/test2

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/springsec/CVE-2022-22620

- https://github.com/sudoBlackArch/182

- https://github.com/sudoBlackArch/900

- https://github.com/sudoBlackArch/ps

- https://github.com/trhacknon/Pocingit

- https://github.com/whoforget/CVE-POC

- https://github.com/youwizard/CVE-POC

- https://github.com/zecool/cve