<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 07 May 2026 00:26:59 +0000</lastBuildDate>
    <item>
      <title>f2e81a17-0165-4c6d-b5af-bf795c60fd86</title>
      <link>https://vulnerability.circl.lu/sighting/f2e81a17-0165-4c6d-b5af-bf795c60fd86/export</link>
      <description>{"uuid": "f2e81a17-0165-4c6d-b5af-bf795c60fd86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40824", "type": "seen", "source": "https://t.me/cvedetector/1963", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40824 - Apple Watch App Data Exposure\", \n  \"Content\": \"CVE ID : CVE-2024-40824 \nPublished : July 29, 2024, 11:15 p.m. | 45\u00a0minutes ago \nDescription : This issue was addressed through improved state management. This issue is fixed in watchOS 10.6, macOS Sonoma 14.6, iOS 17.6 and iPadOS 17.6, tvOS 17.6. An app may be able to bypass Privacy preferences. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T02:21:16.000000Z"}</description>
      <content:encoded>{"uuid": "f2e81a17-0165-4c6d-b5af-bf795c60fd86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40824", "type": "seen", "source": "https://t.me/cvedetector/1963", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40824 - Apple Watch App Data Exposure\", \n  \"Content\": \"CVE ID : CVE-2024-40824 \nPublished : July 29, 2024, 11:15 p.m. | 45\u00a0minutes ago \nDescription : This issue was addressed through improved state management. This issue is fixed in watchOS 10.6, macOS Sonoma 14.6, iOS 17.6 and iPadOS 17.6, tvOS 17.6. An app may be able to bypass Privacy preferences. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T02:21:16.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f2e81a17-0165-4c6d-b5af-bf795c60fd86/export</guid>
      <pubDate>Tue, 30 Jul 2024 02:21:16 +0000</pubDate>
    </item>
  </channel>
</rss>
