{"uuid": "602495eb-332b-4aea-b7ec-6f145cae9be5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-4322", "type": "seen", "source": "https://t.me/information_security_channel/21793", "content": "Full Disclosure: APPLE-SA-2018-10-30-8 Additional information for APPLE-SA-2018-9-24-4 iOS 12\nhttp://sec.jetlib.com/Full_Disclosure/2018/11/02/APPLE-SA-2018-10-30-8_Additional_information_for_APPLE-SA-2018-9-24-4_iOS_12\n\nPosted by Apple Product Security on Nov 02APPLE-SA-2018-10-30-8 Additional information for\n\nAPPLE-SA-2018-9-24-4 iOS 12\n\n\niOS 12 addresses the following:\n\n\nAccounts\n\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\n\ntouch 6th generation\n\nImpact: A local app may be able to read a persistent account\n\nidentifier\n\nDescription: This issue was addressed with improved entitlements.\n\nCVE-2018-4322: Min (Spark) Zheng, Xiaolong Bai of Alibaba Inc.\n\n\nAuto Unlock\n\nAvailable for: iPhone 5s and...", "creation_timestamp": "2018-11-02T19:11:04.000000Z"}