{"vulnerability": "CVE-2024-5452", "sightings": [{"uuid": "edaacb1e-13ec-4d00-8551-d0b8a1f90299", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54524", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113637081247551966", "content": "", "creation_timestamp": "2024-12-12T00:44:12.993209Z"}, {"uuid": "a4f14d03-9590-413f-bcd4-9f90b7598d48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54526", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113637081261182953", "content": "", "creation_timestamp": "2024-12-12T00:44:13.319828Z"}, {"uuid": "90cf713b-e7d4-44f5-8a8c-e8ebfc79f33e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54527", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113637140264574364", "content": "", "creation_timestamp": "2024-12-12T00:59:13.526952Z"}, {"uuid": "af3396ac-003f-4da5-8a73-f1eb303c3eb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54529", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113637140293692742", "content": "", "creation_timestamp": "2024-12-12T00:59:13.953091Z"}, {"uuid": "19dab53a-20db-4e13-9607-fb83855033d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54528", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113637140279133378", "content": "", "creation_timestamp": "2024-12-12T00:59:14.008884Z"}, {"uuid": "07d87877-6377-4525-942a-44e9d6f2e531", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54527", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lfbqfwetu22h", "content": "", "creation_timestamp": "2025-01-09T03:30:03.761512Z"}, {"uuid": "9cbac5d3-f8a2-4393-872c-e03fcdf09a5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54527", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3lfetewcflk2l", "content": "", "creation_timestamp": "2025-01-10T09:01:09.349413Z"}, {"uuid": "d45dc488-6610-4209-a0ba-e564cec747d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54527", "type": "seen", "source": "https://infosec.exchange/users/dragonjar/statuses/113798051999031802", "content": "", "creation_timestamp": "2025-01-09T11:01:12.917799Z"}, {"uuid": "037b0ab1-bfcb-4b63-9d3d-7155f5eb22cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54527", "type": "seen", "source": "https://bsky.app/profile/spritzfinance.bsky.social/post/3lfdbp4qcc626", "content": "", "creation_timestamp": "2025-01-09T18:12:03.365456Z"}, {"uuid": "85e5aace-354c-4818-8533-026259a7ad65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54527", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lfclapkelm2d", "content": "", "creation_timestamp": "2025-01-09T11:30:18.142000Z"}, {"uuid": "4804adfe-a8f4-47ef-91d6-8c2f4daf502e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54520", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgqxqh7sx52n", "content": "", "creation_timestamp": "2025-01-27T22:16:17.360219Z"}, {"uuid": "dfcc7782-52ef-4ab0-bc14-f80c0c2f9853", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54522", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgqxqjhsgn2e", "content": "", "creation_timestamp": "2025-01-27T22:16:19.993743Z"}, {"uuid": "0b58a2d5-e336-4598-8ea1-f54c1b12dc66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54523", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgqxqlkdvd27", "content": "", "creation_timestamp": "2025-01-27T22:16:21.966926Z"}, {"uuid": "965d71e9-e289-47bf-8c2f-619834afbd78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54525", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkmegyejtv2e", "content": "", "creation_timestamp": "2025-03-18T00:01:07.876739Z"}, {"uuid": "0e1647df-52d2-48ae-a1b5-64ca8c07d266", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54527", "type": "seen", "source": "https://bsky.app/profile/calebpr.bsky.social/post/3lj4kjjmqbh2w", "content": "", "creation_timestamp": "2025-02-26T23:42:06.605370Z"}, {"uuid": "7669a98c-13a9-41eb-9b7a-973e6ef24b0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54529", "type": "seen", "source": "https://projectzero.google/2026/01/sound-barrier-2.html", "content": "", "creation_timestamp": "2026-01-30T07:00:00.000000Z"}, {"uuid": "08ee6e84-b950-4b36-8185-5849bf7d2061", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54527", "type": "seen", "source": "MISP/3445a876-cced-4346-bf37-e276ba39cff4", "content": "", "creation_timestamp": "2025-09-02T18:30:14.000000Z"}, {"uuid": "87b7fc18-77b6-4bda-a2ad-b35149edbebf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54529", "type": "seen", "source": "https://bsky.app/profile/infosecbot.bsky.social/post/3me7ebiyfrc2j", "content": "", "creation_timestamp": "2026-02-06T16:48:28.395542Z"}, {"uuid": "9553a267-e412-4de2-b556-f3f77883f29c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54529", "type": "seen", "source": "https://googleprojectzero.blogspot.com/2025/05/breaking-sound-barrier-part-i-fuzzing.html", "content": "", "creation_timestamp": "2025-05-09T15:38:00.000000Z"}, {"uuid": "dcc58f8d-e852-4bda-a54c-a1cf11b9104b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54525", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-12T13:33:28.000000Z"}, {"uuid": "e6eabc55-73f6-4742-8d9f-d98bafdf4777", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54525", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-21T03:19:30.000000Z"}, {"uuid": "dfdd6938-3140-4458-8e6b-ccc11c1c5369", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54529", "type": "seen", "source": "https://bsky.app/profile/allsafeus.bsky.social/post/3mdo4lv66f32d", "content": "", "creation_timestamp": "2026-01-30T20:15:51.428331Z"}, {"uuid": "aa5139a3-accd-43b9-8515-34c66b207e93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54529", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2873", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-54529\n\ud83d\udd39 Description: A logic issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.2, macOS Ventura 13.7.2, macOS Sonoma 14.7.2. An app may be able to execute arbitrary code with kernel privileges.\n\ud83d\udccf Published: 2024-12-11T22:58:22.673Z\n\ud83d\udccf Modified: 2025-01-24T04:55:38.741Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/121839\n2. https://support.apple.com/en-us/121842\n3. https://support.apple.com/en-us/121840", "creation_timestamp": "2025-01-24T05:03:35.000000Z"}, {"uuid": "4e6405cd-a8c3-40b2-8fc9-189244e8882c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5452", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9128", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1a\u6b64\u6f0f\u6d1e\u7684\u6839\u672c\u539f\u56e0\u662f**\u6df1\u5ea6\u5dee\u5f02\u5e93\uff08deepdiff\uff09**\u5728\u53cd\u5e8f\u5217\u5316\u7528\u6237\u8f93\u5165\u65f6\uff0c\u672a\u6b63\u786e\u5904\u7406\u53cc\u4e0b\u5212\u7ebf\uff08dunder\uff09\u5c5e\u6027\u3002 PyTorch Lightning \u4f7f\u7528 deepdiff.Delta \u5bf9\u8c61\u6839\u636e\u524d\u7aef\u64cd\u4f5c\u4fee\u6539\u5e94\u7528\u72b6\u6001\uff0c\u8bbe\u8ba1\u76ee\u6807\u662f\u4ec5\u5141\u8bb8\u7279\u5b9a\u72b6\u6001\u53d8\u91cf\u7684\u4fee\u6539\u3002\nURL\uff1ahttps://github.com/XiaomingX/cve-2024-5452-poc\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-11-22T07:41:16.000000Z"}, {"uuid": "2ceb3fa0-b02e-4e95-8853-0cf19c1cb8a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54525", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7835", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-54525\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A logic issue was addressed with improved file handling. This issue is fixed in visionOS 2.2, watchOS 11.2, tvOS 18.2, macOS Sequoia 15.2, iOS 18.2 and iPadOS 18.2. Restoring a maliciously crafted backup file may lead to modification of protected system files.\n\ud83d\udccf Published: 2025-03-17T19:38:38.635Z\n\ud83d\udccf Modified: 2025-03-17T19:38:38.635Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/121844\n2. https://support.apple.com/en-us/121845\n3. https://support.apple.com/en-us/121839\n4. https://support.apple.com/en-us/121843\n5. https://support.apple.com/en-us/121837", "creation_timestamp": "2025-03-17T19:47:44.000000Z"}, {"uuid": "bf284532-f605-4c14-9fca-e2df97e3af4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54527", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/6709", "content": "#exploit\n1. macOS PackageKit Exploits\nhttps://jhftss.github.io/Endless-Exploits\n\n2. CVE-2024-53704:\nSonicWall SSL VPN Session Hijacking\nhttps://bishopfox.com/blog/sonicwall-cve-2024-53704-ssl-vpn-session-hijacking\n\n3. CVE-2024-54527:\nMediaLibraryService Full TCC Bypass, Dive Deep into AMFI\nhttps://jhftss.github.io/CVE-2024-54527-MediaLibraryService-Full-TCC-Bypass", "creation_timestamp": "2025-02-20T05:23:47.000000Z"}, {"uuid": "8f1b3bbe-180e-44bf-96c2-a94211d9cc62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54527", "type": "published-proof-of-concept", "source": "https://t.me/CyberBulletin/2017", "content": "\u26a1\ufe0fmacOS Vulnerability CVE-2024-54527 Unveiled: TCC Bypass PoC Exploit Code Released.\n\n#CyberBulletin", "creation_timestamp": "2025-01-09T05:37:16.000000Z"}, {"uuid": "68297143-44f5-4a2e-b599-fb159b1085b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54524", "type": "seen", "source": "https://t.me/cvedetector/12679", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54524 - Apple macOS Sequoia Arbitrary File Access Logic Flaw\", \n  \"Content\": \"CVE ID : CVE-2024-54524 \nPublished : Dec. 12, 2024, 2:15 a.m. | 27\u00a0minutes ago \nDescription : A logic issue was addressed with improved file handling. This issue is fixed in macOS Sequoia 15.2. A malicious app may be able to access arbitrary files. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T03:47:05.000000Z"}, {"uuid": "7c6d5b7f-f548-4d3e-af70-c88c359fd807", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54523", "type": "seen", "source": "Telegram/BB5mH_5V4PTa9cIbByMmWFIKcSQNfbVjf2vcFsANgeMrCvTa", "content": "", "creation_timestamp": "2025-02-18T21:11:33.000000Z"}, {"uuid": "88c3fdfc-4d47-4b6f-99ad-af411c8bedd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54525", "type": "seen", "source": "https://t.me/cvedetector/20527", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54525 - Apple VisionOS/TvOS/WatchOS/MacOS/iOS/PadOS Backup File Corruption Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-54525 \nPublished : March 17, 2025, 8:15 p.m. | 1\u00a0hour, 50\u00a0minutes ago \nDescription : A logic issue was addressed with improved file handling. This issue is fixed in visionOS 2.2, watchOS 11.2, tvOS 18.2, macOS Sequoia 15.2, iOS 18.2 and iPadOS 18.2. Restoring a maliciously crafted backup file may lead to modification of protected system files. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-17T23:20:06.000000Z"}, {"uuid": "86589131-9865-4d33-88b0-fe175de3ffdf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5452", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/2161", "content": "\u200aCVE-2024-5452: Critical PyTorch Lightning Vulnerability Exposes AI Models to Remote Hijacking\n\nhttps://securityonline.info/cve-2024-5452-critical-pytorch-lightning-vulnerability-exposes-ai-models-to-remote-hijacking/", "creation_timestamp": "2024-06-11T13:54:51.000000Z"}, {"uuid": "c4f56687-7be3-4a08-891c-4a27677d4744", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54526", "type": "seen", "source": "https://t.me/cvedetector/12686", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54526 - Apple WatchOS Private Information Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-54526 \nPublished : Dec. 12, 2024, 2:15 a.m. | 27\u00a0minutes ago \nDescription : The issue was addressed with improved checks. This issue is fixed in watchOS 11.2, tvOS 18.2, macOS Sequoia 15.2, iOS 18.2 and iPadOS 18.2, macOS Ventura 13.7.2, macOS Sonoma 14.7.2. A malicious app may be able to access private information. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T03:47:13.000000Z"}, {"uuid": "c61ec0b2-e364-4991-8f9e-64396e7b5d9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54529", "type": "seen", "source": "https://t.me/cvedetector/12667", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54529 - Apple macOS Kernel Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-54529 \nPublished : Dec. 12, 2024, 2:15 a.m. | 27\u00a0minutes ago \nDescription : A logic issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.2, macOS Ventura 13.7.2, macOS Sonoma 14.7.2. An app may be able to execute arbitrary code with kernel privileges. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T03:46:51.000000Z"}, {"uuid": "091a3cb6-08d3-4ac3-9e2c-aa0e9abe8a7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54527", "type": "seen", "source": "https://t.me/cvedetector/12684", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54527 - \"Apple WatchOS Exposure\"\", \n  \"Content\": \"CVE ID : CVE-2024-54527 \nPublished : Dec. 12, 2024, 2:15 a.m. | 27\u00a0minutes ago \nDescription : This issue was addressed with improved checks. This issue is fixed in watchOS 11.2, tvOS 18.2, macOS Sequoia 15.2, iOS 18.2 and iPadOS 18.2, macOS Ventura 13.7.2, macOS Sonoma 14.7.2. An app may be able to access sensitive user data. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T03:47:11.000000Z"}, {"uuid": "748e6e46-5ad2-4476-ae6e-175fffd636ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54528", "type": "seen", "source": "https://t.me/cvedetector/12669", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54528 - Apple macOS File Overwrite Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-54528 \nPublished : Dec. 12, 2024, 2:15 a.m. | 27\u00a0minutes ago \nDescription : A logic issue was addressed with improved restrictions. This issue is fixed in macOS Sequoia 15.2, macOS Ventura 13.7.2, macOS Sonoma 14.7.2. An app may be able to overwrite arbitrary files. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T03:46:52.000000Z"}, {"uuid": "56fcdd5e-93fc-4dd6-86c4-3296c457d333", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54529", "type": "published-proof-of-concept", "source": "Telegram/crLRR4vNQUCvgKHwI3YmUHt8X0hISkAcaO1vg2Puo9i14UE", "content": "", "creation_timestamp": "2025-01-23T20:00:05.000000Z"}, {"uuid": "e4cd0a9c-d686-46e2-a523-3a137acc3312", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54527", "type": "seen", "source": "https://t.me/Russian_OSINT/4978", "content": "\ud83c\udf4fApple \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f Passwords \u0432 \u043d\u043e\u0432\u043e\u043c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0438 iOS 18.2\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Apple \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 iOS 18.2, \u043a\u043e\u0442\u043e\u0440\u043e\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u0435\u0440\u044c\u0451\u0437\u043d\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0438 Passwords. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430, \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u0430\u044f \u043a\u0430\u043a CVE-2024-54492 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043d\u0435\u0437\u0430\u0449\u0438\u0449\u0451\u043d\u043d\u044b\u0445 HTTP-\u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u0439 \u0434\u043b\u044f \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438 \u0438\u043a\u043e\u043d\u043e\u043a \u0432\u0435\u0431-\u0441\u0430\u0439\u0442\u043e\u0432. \u041a\u0430\u043a \u0441\u043e\u043e\u0431\u0449\u0430\u0435\u0442 Mysk, \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u0430\u0435\u0442 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0440\u0438\u0441\u043a\u0443, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u043e\u043c\u0443 \u0441 \u0430\u0442\u0430\u043a\u043e\u0439 \u0442\u0438\u043f\u0430 \u00ab\u0447\u0435\u043b\u043e\u0432\u0435\u043a \u043f\u043e\u0441\u0435\u0440\u0435\u0434\u0438\u043d\u0435\u00bb (MITM).\n\n\u041f\u043e\u043c\u0438\u043c\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0432 Passwords, iOS 18.2 \u0442\u0430\u043a\u0436\u0435 \u0432\u043d\u0435\u0441\u043b\u0430 \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u0432 \u0434\u0440\u0443\u0433\u0438\u0435 \u043a\u043b\u044e\u0447\u0435\u0432\u044b\u0435 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u044b:\n\n\ud83d\udd3b AppleMobileFileIntegrity (CVE-2024-54526, CVE-2024-54527): \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u044b \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u043b\u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u043c \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f\u043c \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0447\u0430\u0441\u0442\u043d\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u043e\u0431\u0445\u043e\u0434\u044f \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u043f\u0435\u0441\u043e\u0447\u043d\u0438\u0446\u044b.\n\ud83d\udd3b Kernel (CVE-2024-54494): \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d \u0434\u0435\u0444\u0435\u043a\u0442, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0432\u0448\u0438\u0439 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0437\u0430\u043f\u0438\u0441\u044b\u0432\u0430\u0442\u044c \u0434\u0430\u043d\u043d\u044b\u0435 \u0432 \u043e\u0431\u043b\u0430\u0441\u0442\u044c \u043f\u0430\u043c\u044f\u0442\u0438, \u043f\u0440\u0435\u0434\u043d\u0430\u0437\u043d\u0430\u0447\u0435\u043d\u043d\u0443\u044e \u0442\u043e\u043b\u044c\u043a\u043e \u0434\u043b\u044f \u0447\u0442\u0435\u043d\u0438\u044f.\n\ud83d\udd3b WebKit (CVE-2024-54505): \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u043f\u0443\u0442\u0430\u043d\u0438\u0446\u044b \u0442\u0438\u043f\u043e\u0432, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043c\u043e\u0433\u043b\u0430 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043f\u043e\u0432\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u044e \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u0440\u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0435 \u0437\u043b\u043e\u043d\u0430\u043c\u0435\u0440\u0435\u043d\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u043e\u0433\u043e \u0432\u0435\u0431-\u043a\u043e\u043d\u0442\u0435\u043d\u0442\u0430.\n\ud83d\udd3b Safari (CVE-2024-44246): \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 \u043e\u0448\u0438\u0431\u043a\u0430 \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u0438, \u0438\u0437-\u0437\u0430 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0434\u043e\u0431\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0441\u0430\u0439\u0442\u0430 \u0432 Reading List \u043c\u043e\u0433\u043b\u043e \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u044c IP-\u0430\u0434\u0440\u0435\u0441 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f, \u0434\u0430\u0436\u0435 \u043f\u0440\u0438 \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u043d\u043e\u0439 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 Private Relay.\n\n\ud83d\udc46\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0438\u0437 Mysk Inc. \u0443\u0432\u0435\u0434\u043e\u043c\u0438\u043b\u0438 Apple \u043e\u0431 \u044d\u0442\u043e\u0439 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0435 \u0432 \u0441\u0435\u043d\u0442\u044f\u0431\u0440\u0435 2024 \u0433\u043e\u0434\u0430, \u0438 \u0443\u0436\u0435 11 \u0434\u0435\u043a\u0430\u0431\u0440\u044f \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u044f\u044e\u0449\u0435\u0435 \u043e\u0448\u0438\u0431\u043a\u0443. \u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c Tenable, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u044b\u043b\u0430 \u043a\u043b\u0430\u0441\u0441\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u0430 \u043a\u0430\u043a \"\u043e\u043f\u0430\u0441\u043d\u0430\u044f\", \u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0441\u0434\u0435\u043b\u0430\u0442\u044c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435.\n\n\u270b @Russian_OSINT", "creation_timestamp": "2024-12-12T09:59:39.000000Z"}, {"uuid": "302d3c2c-05cf-475e-8183-1f326d793ebd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54526", "type": "seen", "source": "https://t.me/Russian_OSINT/4978", "content": "\ud83c\udf4fApple \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f Passwords \u0432 \u043d\u043e\u0432\u043e\u043c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0438 iOS 18.2\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Apple \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 iOS 18.2, \u043a\u043e\u0442\u043e\u0440\u043e\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u0435\u0440\u044c\u0451\u0437\u043d\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0438 Passwords. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430, \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u0430\u044f \u043a\u0430\u043a CVE-2024-54492 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043d\u0435\u0437\u0430\u0449\u0438\u0449\u0451\u043d\u043d\u044b\u0445 HTTP-\u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u0439 \u0434\u043b\u044f \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438 \u0438\u043a\u043e\u043d\u043e\u043a \u0432\u0435\u0431-\u0441\u0430\u0439\u0442\u043e\u0432. \u041a\u0430\u043a \u0441\u043e\u043e\u0431\u0449\u0430\u0435\u0442 Mysk, \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u0430\u0435\u0442 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0440\u0438\u0441\u043a\u0443, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u043e\u043c\u0443 \u0441 \u0430\u0442\u0430\u043a\u043e\u0439 \u0442\u0438\u043f\u0430 \u00ab\u0447\u0435\u043b\u043e\u0432\u0435\u043a \u043f\u043e\u0441\u0435\u0440\u0435\u0434\u0438\u043d\u0435\u00bb (MITM).\n\n\u041f\u043e\u043c\u0438\u043c\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0432 Passwords, iOS 18.2 \u0442\u0430\u043a\u0436\u0435 \u0432\u043d\u0435\u0441\u043b\u0430 \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u0432 \u0434\u0440\u0443\u0433\u0438\u0435 \u043a\u043b\u044e\u0447\u0435\u0432\u044b\u0435 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u044b:\n\n\ud83d\udd3b AppleMobileFileIntegrity (CVE-2024-54526, CVE-2024-54527): \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u044b \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u043b\u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u043c \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f\u043c \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0447\u0430\u0441\u0442\u043d\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u043e\u0431\u0445\u043e\u0434\u044f \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u043f\u0435\u0441\u043e\u0447\u043d\u0438\u0446\u044b.\n\ud83d\udd3b Kernel (CVE-2024-54494): \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d \u0434\u0435\u0444\u0435\u043a\u0442, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0432\u0448\u0438\u0439 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0437\u0430\u043f\u0438\u0441\u044b\u0432\u0430\u0442\u044c \u0434\u0430\u043d\u043d\u044b\u0435 \u0432 \u043e\u0431\u043b\u0430\u0441\u0442\u044c \u043f\u0430\u043c\u044f\u0442\u0438, \u043f\u0440\u0435\u0434\u043d\u0430\u0437\u043d\u0430\u0447\u0435\u043d\u043d\u0443\u044e \u0442\u043e\u043b\u044c\u043a\u043e \u0434\u043b\u044f \u0447\u0442\u0435\u043d\u0438\u044f.\n\ud83d\udd3b WebKit (CVE-2024-54505): \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u043f\u0443\u0442\u0430\u043d\u0438\u0446\u044b \u0442\u0438\u043f\u043e\u0432, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043c\u043e\u0433\u043b\u0430 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043f\u043e\u0432\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u044e \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u0440\u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0435 \u0437\u043b\u043e\u043d\u0430\u043c\u0435\u0440\u0435\u043d\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u043e\u0433\u043e \u0432\u0435\u0431-\u043a\u043e\u043d\u0442\u0435\u043d\u0442\u0430.\n\ud83d\udd3b Safari (CVE-2024-44246): \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 \u043e\u0448\u0438\u0431\u043a\u0430 \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u0438, \u0438\u0437-\u0437\u0430 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0434\u043e\u0431\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0441\u0430\u0439\u0442\u0430 \u0432 Reading List \u043c\u043e\u0433\u043b\u043e \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u044c IP-\u0430\u0434\u0440\u0435\u0441 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f, \u0434\u0430\u0436\u0435 \u043f\u0440\u0438 \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u043d\u043e\u0439 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 Private Relay.\n\n\ud83d\udc46\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0438\u0437 Mysk Inc. \u0443\u0432\u0435\u0434\u043e\u043c\u0438\u043b\u0438 Apple \u043e\u0431 \u044d\u0442\u043e\u0439 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0435 \u0432 \u0441\u0435\u043d\u0442\u044f\u0431\u0440\u0435 2024 \u0433\u043e\u0434\u0430, \u0438 \u0443\u0436\u0435 11 \u0434\u0435\u043a\u0430\u0431\u0440\u044f \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u044f\u044e\u0449\u0435\u0435 \u043e\u0448\u0438\u0431\u043a\u0443. \u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c Tenable, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u044b\u043b\u0430 \u043a\u043b\u0430\u0441\u0441\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u0430 \u043a\u0430\u043a \"\u043e\u043f\u0430\u0441\u043d\u0430\u044f\", \u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0441\u0434\u0435\u043b\u0430\u0442\u044c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435.\n\n\u270b @Russian_OSINT", "creation_timestamp": "2024-12-12T09:59:39.000000Z"}, {"uuid": "03ac79da-f09e-47af-b60e-a6c54efb1369", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54525", "type": "published-proof-of-concept", "source": "Telegram/UWcQRTLyNnbLIimUgspqi9VApbez8X0RE6Ho1-v9XBNUVo8", "content": "", "creation_timestamp": "2025-03-23T16:00:09.000000Z"}, {"uuid": "dd00a2d5-648f-4169-b406-049b9ad11080", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54527", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11825", "content": "#exploit\n1. macOS PackageKit Exploits\nhttps://jhftss.github.io/Endless-Exploits\n\n2. CVE-2024-53704:\nSonicWall SSL VPN Session Hijacking\nhttps://bishopfox.com/blog/sonicwall-cve-2024-53704-ssl-vpn-session-hijacking\n\n3. CVE-2024-54527:\nMediaLibraryService Full TCC Bypass, Dive Deep into AMFI\nhttps://jhftss.github.io/CVE-2024-54527-MediaLibraryService-Full-TCC-Bypass", "creation_timestamp": "2025-02-18T03:05:25.000000Z"}]}