{"vulnerability": "cve-2018-4126", "sightings": [{"uuid": "f88fe1e3-79f9-49ff-b525-43ddbdc69ec0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-4126", "type": "seen", "source": "https://t.me/information_security_channel/21794", "content": "Full Disclosure: APPLE-SA-2018-10-30-10 Additional information for APPLE-SA-2018-9-24-5 watchOS 5\nhttp://sec.jetlib.com/Full_Disclosure/2018/11/02/APPLE-SA-2018-10-30-10_Additional_information_for_APPLE-SA-2018-9-24-5_watchOS_5\n\nPosted by Apple Product Security on Nov 02APPLE-SA-2018-10-30-10 Additional information for\n\nAPPLE-SA-2018-9-24-5 watchOS 5\n\n\nwatchOS 5 addresses the following:\n\n\nCFNetwork\n\nAvailable for: Apple Watch Series 1 and later\n\nImpact: An application may be able to execute arbitrary code with\n\nsystem privileges\n\nDescription: A memory corruption issue was addressed with improved\n\nmemory handling.\n\nCVE-2018-4126: Bruno Keith (@bkth_) working with Trend Micro's Zero\n\nDay Initiative\n\nEntry added October...", "creation_timestamp": "2018-11-02T19:12:07.000000Z"}]}