{"uuid": "c61ec0b2-e364-4991-8f9e-64396e7b5d9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54529", "type": "seen", "source": "https://t.me/cvedetector/12667", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54529 - Apple macOS Kernel Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-54529 \nPublished : Dec. 12, 2024, 2:15 a.m. | 27\u00a0minutes ago \nDescription : A logic issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.2, macOS Ventura 13.7.2, macOS Sonoma 14.7.2. An app may be able to execute arbitrary code with kernel privileges. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T03:46:51.000000Z"}