{"vulnerability": "CVE-2023-42949", "sightings": [{"uuid": "f1b1937c-6212-476e-8997-5a1a9e2089d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42949", "type": "seen", "source": "https://t.me/cvedetector/1931", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-42949 - Apple Photos Temporary Directory Photo Access Weakness\", \n  \"Content\": \"CVE ID : CVE-2023-42949 \nPublished : July 29, 2024, 9:15 p.m. | 29\u00a0minutes ago \nDescription : This issue was addressed with improved data protection. This issue is fixed in iOS 17 and iPadOS 17, macOS Sonoma 14, watchOS 10, tvOS 17. An app may be able to access edited photos saved to a temporary directory. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-29T23:50:10.000000Z"}]}