{"uuid": "1178e1cd-2831-423e-b303-b05d05e75019", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40813", "type": "seen", "source": "https://t.me/cvedetector/1957", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40813 - Apple Watch Siri Lock Screen Bypass Vulnerability (Inadvertent Information Disclosure)\", \n  \"Content\": \"CVE ID : CVE-2024-40813 \nPublished : July 29, 2024, 11:15 p.m. | 45\u00a0minutes ago \nDescription : A lock screen issue was addressed with improved state management. This issue is fixed in watchOS 10.6, iOS 17.6 and iPadOS 17.6. An attacker with physical access may be able to use Siri to access sensitive user data. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T02:21:04.000000Z"}