{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-32922","assignerOrgId":"286789f9-fbc2-4510-9f9a-43facdede74c","assignerShortName":"apple","dateUpdated":"2025-05-06T19:18:13.092Z","dateReserved":"2022-06-09T00:00:00.000Z","datePublished":"2022-11-01T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"286789f9-fbc2-4510-9f9a-43facdede74c","shortName":"apple","dateUpdated":"2022-11-01T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"A use after free issue was addressed with improved memory management. This issue is fixed in Safari 16.1, iOS 16.1 and iPadOS 16, macOS Ventura 13. Processing maliciously crafted web content may lead to arbitrary code execution."}],"affected":[{"vendor":"Apple","product":"macOS","versions":[{"version":"unspecified","lessThan":"13","status":"affected","versionType":"custom"}]},{"vendor":"Apple","product":"macOS","versions":[{"version":"unspecified","lessThan":"16.1","status":"affected","versionType":"custom"}]},{"vendor":"Apple","product":"macOS","versions":[{"version":"unspecified","lessThan":"16.1","status":"affected","versionType":"custom"}]}],"references":[{"url":"https://support.apple.com/en-us/HT213488"},{"url":"https://support.apple.com/en-us/HT213489"},{"url":"https://support.apple.com/en-us/HT213495"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"Processing maliciously crafted web content may lead to arbitrary code execution"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T07:54:02.979Z"},"title":"CVE Program Container","references":[{"url":"https://support.apple.com/en-us/HT213488","tags":["x_transferred"]},{"url":"https://support.apple.com/en-us/HT213489","tags":["x_transferred"]},{"url":"https://support.apple.com/en-us/HT213495","tags":["x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-416","lang":"en","description":"CWE-416 Use After Free"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":8.8,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"REQUIRED","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-05-06T19:17:41.087073Z","id":"CVE-2022-32922","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-06T19:18:13.092Z"}}]}}