{"vulnerability": "CVE-2022-32926", "sightings": [{"uuid": "84c82de0-f6fb-442c-bfdf-a70cbe1ce60b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32926", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15187", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-32926\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The issue was addressed with improved bounds checks. This issue is fixed in tvOS 16.1, iOS 15.7.1 and iPadOS 15.7.1, macOS Ventura 13, watchOS 9.1, iOS 16.1 and iPadOS 16. An app with root privileges may be able to execute arbitrary code with kernel privileges.\n\ud83d\udccf Published: 2022-11-01T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-06T19:10:30.113Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/HT213488\n2. https://support.apple.com/en-us/HT213489\n3. https://support.apple.com/en-us/HT213492\n4. https://support.apple.com/en-us/HT213491\n5. https://support.apple.com/en-us/HT213490", "creation_timestamp": "2025-05-06T19:21:00.000000Z"}]}