Download
| Alert*
oval:org.secpod.oval:def:37828
The host is installed with Apple Mac OS X or Server 10.12 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to elevate privileges. oval:org.secpod.oval:def:5842 The host is missing an important security update according to Apple advisory, APPLE-SA-2011-09-09-1. The update is required to fix an information disclosure vulnerability. A flaw is present in the application, which fails to handle fraudulent certificates. Successful exploitation could allow attacke ... oval:org.secpod.oval:def:3931 The host is missing a critical security update according to Apple advisory, APPLE-SA-2012-02-03-1. The update is required to fix multiple vulnerabilities. The flaws are present in the applications which fail to sanitize user supplied input. Successful exploitation could allow attackers to execute ar ... oval:org.secpod.oval:def:25278 This security setting determines whether to audit the event of a user accessing an object for example, a file, folder, registry key, printer, and so forth--that has its own system access control list (SACL) specified. If you define this policy setting, you can specify whether to audit successes, aud ... oval:org.secpod.oval:def:3169 The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.2 and is prone to multiple memory corruption vulnerabilities. The flaw are present in the applications, which fails to handle crafted input. Successful exploitation could allow attackers to overflow the buffer, execute arbitrary ... oval:org.secpod.oval:def:37835 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted PDF. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:50628 The host is installed with Apple Mac OS X 10.14.3 and is prone to a logic error vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. Successful exploitation allows an attacker to cause the recipient to answer through the initiator of a Group F ... oval:org.secpod.oval:def:50629 The host is installed with Apple Mac OS X 10.14.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to gain elevated privileges through an application. oval:org.secpod.oval:def:50630 The host is installed with Apple Mac OS X 10.14.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to produce unspecified impact on live photos in FaceTime server. oval:org.secpod.oval:def:50631 The host is missing a security update according to Apple advisory, APPLE-SA-2019-2-07-2. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to cause memory ... oval:org.secpod.oval:def:3500 The host is installed with Apple Mac OS X 10.6.x through 10.6.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle errors. Successful exploitation could allow attackers to bypass the password requirement for shared-folder. oval:org.secpod.oval:def:3501 The host is installed with Apple Mac OS X 10.6.x through 10.6.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle errors. Successful exploitation could allow attackers to bypass the password requirement for shared-folder. oval:org.secpod.oval:def:3154 The host is installed with Apple Mac OS X 10.6.8 and is prone to multiple vulnerabilities. The flaw are present in the application, which fails to handle disk images. Successful exploitation could allow attackers to crash the service or execute arbitrary code. oval:org.secpod.oval:def:3168 The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.2 and is prone to a buffer overflow vulnerability. The flaw is present in the application, which fails to handle API in Apple Type Services (ATS). Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3110 The host is installed with Apple Mac OS X 10.6.8 and is prone to an out-of-bounds memory access vulnerability. A flaw is present in the application, which fails to handle embedded Type 1 fonts. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:37840 The host is installed with Apple Mac OS X or Server 10.11.6 or 10.10.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to denial of service. oval:org.secpod.oval:def:37830 The host is installed with Apple Mac OS X or Server 10.12 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to arbitrary code execution with additional privileges. oval:org.secpod.oval:def:37829 The host is installed with Apple Mac OS X or Server 10.12 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted font file. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:37827 The host is installed with Apple Mac OS X or Server 10.11.6 or 10.10.5 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:3844 The host is installed with Apple Mac OS X before 10.6.3 and is prone to a stack based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted PostScript document. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3813 The host is installed with Apple Mac OS X before 10.6.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted PEF image. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3824 The host is installed with Apple Mac OS X 10.5.8 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted NEF image. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3860 The host is installed with Apple Mac OS X 10.5.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a macro invocation through invalid buffer. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:32701 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows local users to execute arbitrary code with kernel privileges. oval:org.secpod.oval:def:32704 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows local users to execute arbitrary code with kernel privileges. oval:org.secpod.oval:def:32706 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows local users to execute arbitrary code with kernel privileges. oval:org.secpod.oval:def:32705 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows local users to execute arbitrary code with kernel privileg ... oval:org.secpod.oval:def:3164 The host is installed with Apple Mac OS X 10.6.8 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle crafted QuickTime movie files. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:4278 The host is installed with Apple Mac OS X 10.5.8 or 10.6.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle maliciously crafted embedded font. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:4279 The host is missing a security update according to Apple advisory, APPLE-SA-2010-04-14-1. The update is required to fix an unspecified vulnerability. A flaw is present in the application, which fails to handle maliciously crafted embedded font. Successful exploitation could allow attackers to execut ... oval:org.secpod.oval:def:3846 The host is installed with Apple Mac OS X before 10.6.3 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly validate non-printing ASCII characters. Successful exploitation could allow remote attackers to inject arbitrary web script or H ... oval:org.secpod.oval:def:23889 The host is installed with Apple Mac OS X 10.8.5, 10.9.5 or 10.10.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle serialized objects. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:23888 The host is installed with Apple Mac OS X 10.8.5, 10.9.5 or 10.10.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly perform bounds checking. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:23887 The host is installed with Apple Mac OS X 10.10.2 and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to properly perform bounds checking. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:23892 The host missing a security update according to Apple advisory, APPLE-SA-2015-03-09-3. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary cod ... oval:org.secpod.oval:def:23890 The host is installed with Apple Mac OS X 10.10.2 and is prone to an ASLR bypass vulnerability. A flaw is present in the application, which fails to properly handle malicious or compromised applications. Successful exploitation could allow attackers to determine addresses in the kernel. oval:org.secpod.oval:def:3167 The host is installed with Apple Mac OS X 10.6.8 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle cookies properly. Successful exploitation could allow attackers to set cookies that would be blocked were the preference enforced. oval:org.secpod.oval:def:37834 The host is installed with Apple Mac OS X or Server 10.12 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted font. Successful exploitation may lead to disclose sensitive user information. oval:org.secpod.oval:def:36960 The host is installed with Apple Mac OS X or Server 10.10.5 before update 2016-005 or 10.11.6 before update 2016-001 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow ... oval:org.secpod.oval:def:3109 The host is installed with Apple Mac OS X before 10.7.2 and is prone to format string vulnerability. A flaw is present in the application, which fails to handle a crafted name of an executable file. Successful exploitation could allow attackers to gain elevated privileges. oval:org.secpod.oval:def:24175 The host is missing a security update according to Apple advisory, APPLE-SA-2015-04-08-5. The update is required to fix an integer overflow vulnerability. A flaw is present in the application, which fails to properly perform check before type conversions. Successful exploitation could allow attacker ... oval:org.secpod.oval:def:24174 The host is installed with Xcode before 6.3 on Apple Mac OS X 10.9.4 or later and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly perform check before type conversions. Successful exploitation could allow attackers to execute arbitrary cod ... oval:org.secpod.oval:def:34185 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to properly handle a Trojan horse program that is loaded from an unexpected directory by an application that has a vali ... oval:org.secpod.oval:def:3128 The host is installed with Apple Mac OS X 10.6.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which updates App Store help content over HTTP. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:3815 The host is installed with Apple Mac OS X before 10.6.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly disable the filter rules associated with a deleted mail account. Successful exploitation could allow attackers to have unspecified impac ... oval:org.secpod.oval:def:45302 The host is installed with Apple Mac OS X 10.13.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle memory corruption issues with improper error handling. Successful exploitation leads an application to gain elevated privileges ... oval:org.secpod.oval:def:45303 The host is installed with Apple Mac OS X 10.13.4 and is prone to a UI-spoofing vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted test message. Successful exploitation leads to UI spoofing. oval:org.secpod.oval:def:45304 The host is missing a security update according to Apple advisory, APPLE-SA-2018-04-24-2. The update is required to fix multiple vulnerabilities. A flaw is present in the application, which fails to properly handle maliciously crafted vectors. Successful exploitation may lead to UI spoofing or memor ... oval:org.secpod.oval:def:44096 The host is installed with Apple Mac OS X 10.13.3 and is prone to a memory corruption vulnerability. The flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker processing a maliciously crafted string to lead to heap co ... oval:org.secpod.oval:def:44097 The host is missing a security update according to Apple advisory, APPLE-SA-2018-02-19-2. The update is required to fix memory corruption vulnerability. The flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation could allow attackers pro ... oval:org.secpod.oval:def:32698 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows local user to execute arbitrary code with root privileges. oval:org.secpod.oval:def:32702 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows local users to execute arbitrary code with kernel privileges. oval:org.secpod.oval:def:32703 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows local users to execute arbitrary code with kernel privileges. oval:org.secpod.oval:def:50290 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to elevate privileges through a malicious appli ... oval:org.secpod.oval:def:50291 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to execute arbitrary code with kernel pr ... oval:org.secpod.oval:def:50292 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a lock state checking issue. Successful exploitation allows an attacker to cause unexpected changes in memory ... oval:org.secpod.oval:def:50293 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.2 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a bounds checking issue. Successful exploitation allows an attacker to execute arbitrary code with kernel privil ... oval:org.secpod.oval:def:50294 The host is installed with Apple Mac OS X 10.13.6 or 10.14.2 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to determine kernel memory layout. oval:org.secpod.oval:def:50295 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.2 and is prone to a memory initialization vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows an attacker to cause unexpected changes in memory s ... oval:org.secpod.oval:def:50296 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to execute arbitrary code with kernel pr ... oval:org.secpod.oval:def:50286 The host is installed with Apple Mac OS X 10.13.6 or 10.14.2 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows an attacker to initiate a FaceTime call causing arbitrary code exe ... oval:org.secpod.oval:def:50287 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. Successful exploitation allows an attacker to elevate privileges through a malicious ... oval:org.secpod.oval:def:50288 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory handling issue. Successful exploitation allows an attacker to execute arbitrary code with system priv ... oval:org.secpod.oval:def:50289 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.2 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows an attacker to break out of its sandbox. oval:org.secpod.oval:def:50297 The host is installed with Apple Mac OS X 10.14.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to cause a denial of service. oval:org.secpod.oval:def:50298 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.2 and is prone to a out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to read restricted memory. oval:org.secpod.oval:def:50281 The host is installed with Apple Mac OS X 10.13.6 or 10.14.2 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to execute arbitrary code. oval:org.secpod.oval:def:50282 The host is installed with Apple Mac OS X 10.13.6 or 10.14.2 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle a bounds checking issue. Successful exploitation allows an attacker to elevate privileges through a malicious applica ... oval:org.secpod.oval:def:50284 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.2 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle a bounds checking issue. Successful exploitation allows an attacker to read restricted memory. oval:org.secpod.oval:def:50285 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.2 and is prone to a memory initialization vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows an attacker to break out of its sandbox. oval:org.secpod.oval:def:50302 The host is installed with Apple Mac OS X 10.14.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. Successful exploitation allows an attacker to execute arbitrary code through a maliciously crafted web c ... oval:org.secpod.oval:def:50303 The host is missing a security update according to Apple advisory, APPLE-SA-2019-1-22-2. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to cause memory ... oval:org.secpod.oval:def:37838 The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to execute arbitrary code with root privileg ... oval:org.secpod.oval:def:37837 The host is installed with Apple Mac OS X or Server 10.12 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:37832 The host is installed with Apple Mac OS X or Server 10.12 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted JPEG file. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:37831 The host is installed with Apple Mac OS X or Server 10.12 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle proxy credentials. Successful exploitation may be able to leak sensitive user information. oval:org.secpod.oval:def:42259 The host is missing a security update according to Apple advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle malicious vectors. Successful exploitation could allow attackers to bypass and disclose information. oval:org.secpod.oval:def:42258 The host is installed with Apple Mac OS X or Server 10.13 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a malicious application. Successful exploitation could allow attackers to bypass the keychain access prompt with a synthetic ... oval:org.secpod.oval:def:42257 The host is installed with Apple Mac OS X or Server 10.13 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle when hint was set in Disk Utility while creating an APFS encrypted volume, the password will be stored as the hint. ... oval:org.secpod.oval:def:3156 The host is installed with Apple Mac OS X 10.7.0 before 10.7.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to handle errors during processing of a nonstandard extension in a Certificate Revocation list (CRL). Successful exploitation could allow att ... oval:org.secpod.oval:def:37841 The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected system termination or arbitrar ... oval:org.secpod.oval:def:37839 The host is installed with Apple Mac OS X or Server 10.12 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to denial of service. oval:org.secpod.oval:def:4290 The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to multiple integer overflow vulnerability. A flaw is present in the application, which fails to handle ciphertext with a length that is too short to be valid. Successful exploitation could allow attackers to execute ... oval:org.secpod.oval:def:4291 The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to double free vulnerability. A flaw is present in the application, which fails to handle a request associated with (1) renewal or (2) validation. Successful exploitation could allow attackers to execute arbitrary co ... oval:org.secpod.oval:def:3862 The host is installed with Apple Mac OS X 10.5.5 or 105.8 and is prone to an arbitrary shell command execution vulnerability. A flaw is present in the application, which fails to properly handle escape characters. Successful exploitation could allow attackers to execute arbitrary shell commands. oval:org.secpod.oval:def:3861 The host is installed with Apple Mac OS X 10.5.5 or 10.5.8 and is prone to a arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly sanitize inputs before invoking the execute or system functional. Successful exploitation could allow attackers to execut ... oval:org.secpod.oval:def:4304 The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle crafted Wiki content. Successful exploitation allows remote attackers to inject arbitrary web script or HTML . oval:org.secpod.oval:def:17516 The host is installed with Apple Mac OS X 10.9.2 and is prone to format string vulnerability. A flaw is present in the application, which fails to properly handle URLs. Successful exploitation allows attackers to cause arbitrary code execution. oval:org.secpod.oval:def:17515 The host is installed with Apple Mac OS X or Server 10.7.5, OS X 10.8.5 or OS X 10.9.2 and is prone to privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle the processing of Set-Cookie HTTP headers. Successful exploitation allows attackers to obtai ... oval:org.secpod.oval:def:17523 The host is installed with Apple Mac OS X 10.9.2 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle the screen lock/unlock. Successful exploitation allows the system to get unlocked. oval:org.secpod.oval:def:17522 The host is installed with Apple Mac OS X 10.9.2 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly handle XNU object. Successful exploitation allows attackers to bypass kernel address space layout randomization. oval:org.secpod.oval:def:17521 The host is installed with Apple Mac OS X 10.9.2 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly handle IOKit object. Successful exploitation allows attackers to bypass kernel address space layout randomization. oval:org.secpod.oval:def:17520 The host is installed with Apple Mac OS X 10.8.5 or OS X 10.9.2 and is prone to improper validation vulnerability. A flaw is present in the application, which fails to properly handle a pointer from userspace. Successful exploitation allows attackers to take control of the system. oval:org.secpod.oval:def:17527 The host is installed with Apple Mac OS X 10.8.5 or OS X 10.9.2 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle the WindowServer sessions. Successful exploitation allows attackers to execute arbitrary code outside the sandb ... oval:org.secpod.oval:def:17526 The host is installed with Apple Mac OS X 10.8.5 or OS X 10.9.2 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly handle the sessions protected by SSL. Successful exploitation allows attackers to capture data or change the operations perform ... oval:org.secpod.oval:def:17519 The host is installed with Apple Mac OS X 10.8.5 or OS X 10.9.2 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle JPEG images. Successful exploitation allows attackers to lead to an unexpected application termination or arbitrary code ... oval:org.secpod.oval:def:17518 The host is installed with Apple Mac OS X 10.9.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle ASN.1 data. Successful exploitation allows attackers to cause a denial of service. oval:org.secpod.oval:def:17517 The host is installed with Apple Mac OS X 10.8.5 and is prone to buffer underflow vulnerability. A flaw is present in the application, which fails to properly handle fonts in PDF files. Successful exploitation allows attackers to cause arbitrary code execution. oval:org.secpod.oval:def:17528 The host is missing a security update according to Apple advisory, APPLE-SA-2014-04-22-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle certain objects and security vectors. Successful exploitation allows attackers to execute ... oval:org.secpod.oval:def:3152 The host is installed with Apple Mac OS X 10.7 before 10.7.2 and is prone to a authentication bypass vulnerability. A flaw is present in the application, which fails to properly handle authentication authority. Successful exploitation could allow attackers to bypass the password requirement. oval:org.secpod.oval:def:3153 The host is installed with Apple Mac OS X 10.7 before 10.7.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle access control issue existed in Open Directory. Successful exploitation could allow attackers to another local user's pass ... oval:org.secpod.oval:def:3158 The host is installed with Apple Mac OS X 10.7.0 before 10.7.2 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to prevent FireWire DMA in the absence of a login. Successful exploitation could allow attackers to bypass intended access restrictions. oval:org.secpod.oval:def:3157 The host is installed with Apple Mac OS X 10.7.0 before 10.7.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle file deletions in directories with the sticky bit. Successful exploitation could allow attackers to bypass intended permiss ... oval:org.secpod.oval:def:3163 The host is installed with Apple Mac OS X 10.7 before 10.7.2 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to prevent system windows from requesting keystrokes while the screen is locked. Successful exploitation could allow attackers to partially ... oval:org.secpod.oval:def:3161 The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.2 and is prone to a stack consumption vulnerability. A flaw is present in the application, which fails to properly track the specific X.509 certificate that a user manually accepted for an initial https WebDAV connection. Success ... oval:org.secpod.oval:def:3160 The host is installed with Apple Mac OS X 10.6.8 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a locked-screen state in display sleep mode for an Apple Cinema Display. Successful exploitation could allow attackers to bypass the password ... oval:org.secpod.oval:def:3122 The host is installed with Apple Mac OS X 10.7.0 before 10.7.2 and is prone to a improper access control vulnerability. A flaw is present in the application, which fails to prevent _unknown user from browsing the share point but not guests. Successful exploitation could allow attackers to access sha ... oval:org.secpod.oval:def:37842 The host is installed with Apple Mac OS X or Server 10.12 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to disclosure of password length. oval:org.secpod.oval:def:3831 The host is installed with Apple Mac OS X before 10.6.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle vectors related to use of wheel group membership during access to the home directories of user accounts. Successful explo ... oval:org.secpod.oval:def:3842 The host is installed with Apple Mac OS X 10.6 before 10.6.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to prevent deletion of access restrictions of a Podcast Composer workflow when this workflow is overwritten. Successful exploitation could a ... oval:org.secpod.oval:def:3843 The host is installed with Apple Mac OS X 10.6 before 10.6.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to support Login Window access control that is based solely on group membership. Successful exploitation could allow attackers to bypass int ... oval:org.secpod.oval:def:3865 The host is installed with Apple Mac OS X 10.6 before 10.6.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to enforce the service access control list (SACL) for weblogs during weblog creation. Successful exploitation could allow remote authenticat ... oval:org.secpod.oval:def:34186 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow local users to gain privileges. oval:org.secpod.oval:def:36961 The host is missing a security update according to Apple advisory, APPLE-SA-2016-09-01-2. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to caus ... oval:org.secpod.oval:def:36959 The host is installed with Apple Mac OS X or Server 10.10.5 before update 2016-005 or 10.11.6 before update 2016-001 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote ... oval:org.secpod.oval:def:3847 The host is installed with Apple Mac OS X before 10.6.3 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly handle crafted unicode string. Successful exploitation could allow remote attackers to inject arbitrary web script or HTML. oval:org.secpod.oval:def:34646 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ... oval:org.secpod.oval:def:54623 The host is installed with Apple Mac OS X 10.14.6 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to properly handle a memory management issue. Successful exploitation allows an attacker to execute arbitrary code with system privileges. oval:org.secpod.oval:def:4299 The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to a cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to handle vectors involving symbolic links. Successful exploitation could allows remote authenticated users to access a ... oval:org.secpod.oval:def:3115 The host is installed with Apple Mac OS X 10.6.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle the combination of signed negative responses and corresponding RRSIG records in the cache. Successful exploitation could allow attackers to ... oval:org.secpod.oval:def:3116 The host is installed with Apple Mac OS X 10.6.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to determine the security status of an NS RRset during a DNSKEY algorithm rollover. Successful exploitation could allow attackers to crash the service ... oval:org.secpod.oval:def:3884 The host is missing an update according to Apple advisory, APPLE-SA-2009-08-12-1. The update is required to fix a denial of service vulnerability. A flaw is present in the dns_db_findrdataset function in db.c, which fails to handle maliciously crafted update message. Successful exploitation could al ... oval:org.secpod.oval:def:3883 The host is installed with Apple Mac OS X 10.4.11 or 10.5.8 and is prone to a denial of service vulnerability. A flaw is present in the dns_db_findrdataset function in db.c, which fails to handle maliciously crafted update message. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3816 The host is installed with Apple Mac OS X before 10.6.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly enforce the key usage extension during processing of a keychain that specifies multiple certificates for an e-mail recipient. ... oval:org.secpod.oval:def:23891 The host is installed with Apple Mac OS X 10.8.5, 10.9.5 or 10.10.2 and is prone to a man-in-the-middle attack vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to downgrade the TLS session security and pot ... oval:org.secpod.oval:def:3837 The host is installed with Apple Mac OS X server before 10.5.8 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly handle symbolic links. Successful exploitation could allow local user with write access to a directory that is being deleted ma ... oval:org.secpod.oval:def:3836 The host is installed with Apple Mac OS X server before 10.5.8 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly handle symbolic links. Successful exploitation could allow local user with write access to a directory that is being deleted ma ... oval:org.secpod.oval:def:37836 The host is installed with Apple Mac OS X or Server 10.11.6 or 10.10.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to disclosure of sensitive information. oval:org.secpod.oval:def:59857 The host is missing a security update according to the Apple advisory APPLE-SA-2019-12-10-7 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted file. Successful exploitation may lead to arbitrary code executi ... oval:org.secpod.oval:def:59858 The host is installed with Xcode before 11.3 on Apple Mac OS X 10.14.4 or later and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted file. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:58797 The host is missing a security update according to the Apple advisory APPLE-SA-2019-9-26-7 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues. Successful exploitation allows attackers to execute arbitrary code with user ... oval:org.secpod.oval:def:58799 The host is installed with Xcode before 11.0 on Apple Mac OS X 10.14.4 or later and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to execute arbitrary c ... oval:org.secpod.oval:def:58804 The host is installed with Xcode before 11.0 on Apple Mac OS X 10.14.4 or later and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. Successful exploitation allows an attacker to execute arbitrary code via a ... oval:org.secpod.oval:def:58800 The host is installed with Xcode before 11.0 on Apple Mac OS X 10.14.4 or later and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to execute arbitrary c ... oval:org.secpod.oval:def:58801 The host is installed with Xcode before 11.0 on Apple Mac OS X 10.14.4 or later and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to execute arbitrary c ... oval:org.secpod.oval:def:58802 The host is installed with Xcode before 11.0 on Apple Mac OS X 10.14.4 or later and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to execute arbitrary c ... oval:org.secpod.oval:def:58803 The host is installed with Xcode before 11.0 on Apple Mac OS X 10.14.4 or later and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. Successful exploitation allows an attacker to execute arbitrary code via a ... oval:org.secpod.oval:def:42909 The host is installed with Apple Mac OS X 10.13 or 10.13.1 and is prone to an authentication bypass vulnerability. The flaw is present in the application, which fails to properly handle the validation of credentials. Successful exploitation could allow attackers to bypass administrator authenticatio ... oval:org.secpod.oval:def:42908 The host is missing a security update according to APPLE-SA-2017-11-29-1. The update is required to fix an authentication bypass vulnerability. A flaw is present in the application, which fails to properly handle validation of credentials. Successful exploitation could allow attackers to bypass admi ... oval:org.secpod.oval:def:21723 The host is installed with Apple Mac OS X or Server before 10.10.1 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to obtain sensitive information. oval:org.secpod.oval:def:21724 The host is installed with Apple Mac OS X or Server before 10.10.1 and is prone to information disclosure vulnerability. A flaw is present in the "System Profiler About This Mac", which fails to properly handle unspecified vectors. Successful exploitation allows attackers to obtain sensitive informa ... oval:org.secpod.oval:def:34618 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.5 and is prone to an information disclosure of kernel memory content vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allo ... oval:org.secpod.oval:def:34619 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ... oval:org.secpod.oval:def:34677 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to leak sensitive user in ... oval:org.secpod.oval:def:34675 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to cause unexpected application ... oval:org.secpod.oval:def:34676 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to reset an expired password from th ... oval:org.secpod.oval:def:34673 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute a ... oval:org.secpod.oval:def:34674 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to cause unexpected application ... oval:org.secpod.oval:def:34671 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to modify another user's contact lis ... oval:org.secpod.oval:def:34672 The host is installed with Apple Mac OS X or Server 10.10.5 or 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary ... oval:org.secpod.oval:def:34670 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to leak sensitive user in ... oval:org.secpod.oval:def:34669 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to leak sensitive user in ... oval:org.secpod.oval:def:34659 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to cause unexpected application ... oval:org.secpod.oval:def:34657 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ... oval:org.secpod.oval:def:34658 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ... oval:org.secpod.oval:def:34655 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ... oval:org.secpod.oval:def:34656 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ... oval:org.secpod.oval:def:34653 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ... oval:org.secpod.oval:def:34654 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ... oval:org.secpod.oval:def:34651 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ... oval:org.secpod.oval:def:34652 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ... oval:org.secpod.oval:def:34648 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary cod ... oval:org.secpod.oval:def:34649 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ... oval:org.secpod.oval:def:34647 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ke ... oval:org.secpod.oval:def:34644 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ... oval:org.secpod.oval:def:34645 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ... oval:org.secpod.oval:def:4288 The host is installed with Apple Mac OS X 10.5.8 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted movie file with MPEG2 encoding. Successful exploitation could allow attackers to execute arbitrary code or crash the service. oval:org.secpod.oval:def:4285 The host is installed with Apple Mac OS X 10.6 before 10.6.4 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle via a crafted help: URL. Successful exploitation could allow attackers to inject arbitrary web script or HTML. oval:org.secpod.oval:def:4286 The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to handle directory traversal sequences in an inline image-transfer operation. Successful exploitation could allow attackers t ... oval:org.secpod.oval:def:4289 The host is installed with Apple Mac OS X 10.6 before 10.6.4 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to handle invalid (1) AS-REQ or (2) TGS-REQ request. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:4283 The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to set the expected file ownerships. Successful exploitation allows local users to bypass intended access restrictions. oval:org.secpod.oval:def:4284 The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to a arbitrary file deletion vulnerability. A flaw is present in the application, which fails to handle a symlink attack in conjunction with an unmount operation on a crafted volume. Successful exploitation allows lo ... oval:org.secpod.oval:def:4296 The host is installed with Apple Mac OS X 10.6 before 10.6.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly interpret character encoding. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:4297 The host is installed with Apple Mac OS X 10.6 before 10.6.4 and is prone to a integer overflow vulnerability. A flaw is present in the application, which fails to handle vectors related to page sizes. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:4294 The host is installed with Apple Mac OS X 10.6 before 10.6.4 and is prone to multiple format string vulnerabilities. The flaws are present in the application, which fails to handle format string specifiers in a (1) afp, (2) cifs, or (3) smb URL. Successful exploitation could allow attackers to crash ... oval:org.secpod.oval:def:4295 The host is installed with Apple Mac OS X 10.6 before 10.6.4 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle certain SSL failures. Successful exploitation could allow attackers to spoof arbitrary network account servers, and poss ... oval:org.secpod.oval:def:4293 The host is installed with Apple Mac OS X 10.5.8 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to provide expected authorization requirements. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:44845 The host is installed with Apple Mac OS X 10.13.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle memory corruption issues. Successful exploitation allows an application to execute arbitrary code with system privileges. oval:org.secpod.oval:def:44846 The host is installed with Apple Mac OS X 10.13.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle memory corruption issues. Successful exploitation allows an application to execute arbitrary code with kernel privileges. oval:org.secpod.oval:def:44847 The host is installed with Apple Mac OS X 10.13.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle memory corruption issues. Successful exploitation allows an application to execute arbitrary code with kernel privileges. oval:org.secpod.oval:def:44848 The host is installed with Apple Mac OS X 10.11.6 or 10.12.6 or 10.13.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle improper validation. Successful exploitation allows an application to read restricted memory. oval:org.secpod.oval:def:44841 The host is installed with Apple Mac OS X 10.11.6 or 10.12.6 or 10.13.3 and is prone to an access control vulnerability. A flaw is present in the application, which fails to properly a mounted malicious disk image. Successful exploitation allows an application to launch an application. oval:org.secpod.oval:def:44842 The host is installed with Apple Mac OS X 10.13.3 and is prone to an arbitrary code injection vulnerability. A flaw is present in the application, which fails to properly handle APFS volume passwords. Successful exploitation leads to an arbitrary code injection through truncation of APFS volume pass ... oval:org.secpod.oval:def:44843 The host is installed with Apple Mac OS X 10.13.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle improper validation. Successful exploitation allows an application to gain elevated privileges. oval:org.secpod.oval:def:44844 The host is installed with Apple Mac OS X 10.11.6 or 10.12.6 or 10.13.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle improper validation. Successful exploitation allows an application to gain elevated privileges. oval:org.secpod.oval:def:44849 The host is installed with Apple Mac OS X 10.13.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle memory corruption issues. Successful exploitation allows an application to execute arbitrary code with kernel privileges. oval:org.secpod.oval:def:44850 The host is installed with Apple Mac OS X 10.11.6 or 10.12.6 or 10.13.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle out-of-bounds read. Successful exploitation allows an application execute arbitrary code with kernel pri ... oval:org.secpod.oval:def:44851 The host is installed with Apple Mac OS X 10.13.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle out-of-bounds read issues. Successful exploitation allows an application to execute arbitrary code with system privileges. oval:org.secpod.oval:def:44856 The host is installed with Apple Mac OS X 10.13.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle improper validation. Successful exploitation allows an application to gain elevated privileges. oval:org.secpod.oval:def:44857 The host is installed with Apple Mac OS X 10.13.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle improper validation. Successful exploitation allows an application to gain elevated privileges. oval:org.secpod.oval:def:44858 The host is installed with Apple Mac OS X 10.13.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly input validation issues. Successful exploitation allows an application to read restricted memory. oval:org.secpod.oval:def:44859 The host is installed with Apple Mac OS X 10.13.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly input validation issues. Successful exploitation allows an application to read restricted memory. oval:org.secpod.oval:def:44852 The host is installed with Apple Mac OS X 10.11.6 or 10.12.6 or 10.13.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted applications. Successful exploitation allows an application to bypass code signing en ... oval:org.secpod.oval:def:44853 The host is installed with Apple Mac OS X 10.11.6 or 10.12.6 or 10.13.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle out-of-bounds read. Successful exploitation allows an application execute arbitrary code with system pri ... oval:org.secpod.oval:def:44854 The host is installed with Apple Mac OS X 10.13.3 and is prone to an improper certificate validation vulnerability. A flaw is present in the application, which fails to properly handle S/MIME-encrypted HTML e-mail. Successful exploitation allows an application to exfiltrate the contents of S/MIME-en ... oval:org.secpod.oval:def:44855 The host is installed with Apple Mac OS X 10.13.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle inconsistent user-interface. Successful exploitation allows an application to intercept the contents of S/MIME-encrypted e-m ... oval:org.secpod.oval:def:44860 The host is installed with Apple Mac OS X 10.11.6 or 10.12.6 or 10.13.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle improper validation. Successful exploitation allows an application to read restricted memory. oval:org.secpod.oval:def:44861 The host is installed with Apple Mac OS X 10.13.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle improper validation. Successful exploitation allows an application to gain elevated privileges. oval:org.secpod.oval:def:44867 The host is installed with Apple Mac OS 10.13.3 or 10.12.6 or 10.11.6 and is prone to multiple vulnerabilities. The flaw is present in the application, which fails to properly handle multiple issues. Successful exploitation allows remote attackers to execute arbitrary code or read restricted memory. oval:org.secpod.oval:def:44863 The host is installed with Apple Mac OS X 10.11.6 or 10.12.6 or 10.13.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle improper validation. Successful exploitation allows an application to read restricted memory. oval:org.secpod.oval:def:44864 The host is installed with Apple Mac OS X 10.13.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an issue in CFPreferences. Successful exploitation allows an application to read restricted memory. oval:org.secpod.oval:def:44865 The host is installed with Apple Mac OS X 10.11.6 or 10.12.6 or 10.13.3 and is prone to an arbitrary code injection vulnerability. A flaw is present in the application, which fails to properly handle bracketed paste mode. Successful exploitation allows an application to execute arbitrary command exe ... oval:org.secpod.oval:def:44866 The host is installed with Apple Mac OS X 10.13.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle keystrokes entered by unprivileged applications. Successful exploitation allows an application to read restricted memory. oval:org.secpod.oval:def:44834 The host is installed with Apple Mac OS X 10.13.3 and is prone to an arbitrary code injection vulnerability. A flaw is present in the application, which fails to properly handle APFS volume passwords. Successful exploitation leads to an arbitrary code injection through truncation of APFS volume pass ... oval:org.secpod.oval:def:44835 The host is installed with Apple Mac OS X 10.11.6, 10.12.6 or 10.13.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle improper validation. Successful exploitation allows an application to gain elevated privileges. oval:org.secpod.oval:def:44836 The host is installed with Apple Mac OS X 10.11.6 or 10.12.6 or 10.13.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle improper validation. Successful exploitation allows an application to gain elevated privileges. oval:org.secpod.oval:def:44837 The host is installed with Apple Mac OS X 10.11.6 or 10.12.6 or 10.13.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle improper validation. Successful exploitation allows an application to gain elevated privileges. oval:org.secpod.oval:def:44832 The host is installed with Apple Mac OS X 10.13.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle passwords passed to sysadminctl tool. Successful exploitation leads to the exposure of passwords to other local users. oval:org.secpod.oval:def:44833 The host is installed with Apple Mac OS X 10.11.6, 10.12.6 or 10.13.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted files in symlinks. Successful exploitation allows attackers to disclose user informa ... oval:org.secpod.oval:def:44838 The host is installed with Apple Mac OS X 10.13.3 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted strings. Successful exploitation leads to denial of service. oval:org.secpod.oval:def:44839 The host is installed with Apple Mac OS X 10.11.6 or 10.12.6 and is prone to an information access vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted webpages. Successful exploitation allows an application to mount a disk image. oval:org.secpod.oval:def:3132 he host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.2 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to handle a crafted movie file. Successful exploitation could allow attackers to execute arbitrary code or crash t ... oval:org.secpod.oval:def:3130 The host is installed with Apple QuickTime in Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.2 and is prone to multiple vulnerabilities. A flaw is present in the application, which fails to handle the atom hierarchy in movie files. Successful exploitation could allow attackers to execute arbitrary code ... oval:org.secpod.oval:def:3131 The host is installed with Apple Mac OS X 10.6.8 and is prone to a cross site scripting vulnerability. A flaw is present in the QuickTime Player's "Save for Web" application, which fails to remove reference to an online script. Successful exploitation could allow attackers to inject arbitrary code. oval:org.secpod.oval:def:3119 The host is installed with Quicktime in Apple Mac OS X 10.6.8 or 10.7 before 10.7.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle URL data handlers within movie files. Successful exploitation could allow attackers to disclose mem ... oval:org.secpod.oval:def:3117 The host is installed with Apple Mac OS X and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted FlashPix file. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3121 The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.2 and is prone to an buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted FLIC movie file. Successful exploitation could allow attackers to execute arbitrary code or crash the servi ... oval:org.secpod.oval:def:46327 The host is installed with Apple Mac OS X 10.13.5 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle an out-of-bounds read issue. On successful exploitation, a local user may be able to read kernel memory. oval:org.secpod.oval:def:46326 The host is installed with Apple Mac OS X 10.13.5 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle an out-of-bounds read issue. On successful exploitation, a local user may be able to read kernel memory. oval:org.secpod.oval:def:46328 The host is installed with Apple Mac OS X 10.13.5 and is prone to an address bar spoofing vulnerability. A flaw is present in the application, which fails to properly handle spoofing issues in URL. Successful exploitation allows attackers to spoof address bars. oval:org.secpod.oval:def:32697 The host is missing a security update according to Apple advisory, APPLE-SA-2015-12-08-3. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows remote attackers to execute arbitrary code wi ... oval:org.secpod.oval:def:32699 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle search order or quarantine checks improved memory. Successful exploitation allows attackers to override OSA scr ... oval:org.secpod.oval:def:32700 The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.4, 10.11.x before 10.11.3 and is prone to an arbitrary code vulnerability. A flaw is present in the application, which fails to properly handle a crafted website. Successful exploitation allows remote attackers to ex ... oval:org.secpod.oval:def:71493 The host is installed with Apple Mac OS X 10.14.6 or 10.15.7 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a permissions logic issue. Successful exploitation allows an attacker to execute arbitrary code with system privileg ... oval:org.secpod.oval:def:71492 The host is installed with Apple Mac OS X 10.14.6 or 10.15.7 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allows an attacker to cause arbitrary code execution. oval:org.secpod.oval:def:3774 The host is installed with Apple Mac OS X 10.6 before 10.6.3 or Apple Quicktime 7.6.6 and is prone to a buffer overflow vulnerability. A flaw is present in the applications, which fail to handle a crafted movie file with RLE encoding. Successful exploitation could allow attackers to trigger memory c ... oval:org.secpod.oval:def:3775 The host is installed with Apple Mac OS X 10.6 before 10.6.3 or Apple Quicktime 7.6.6 and is prone to a buffer overflow vulnerability. A flaw is present in the applications, which fail to handle a malformed movie file. Successful exploitation could allow attackers to trigger an incorrect buffer leng ... oval:org.secpod.oval:def:3772 The host is installed with Apple Mac OS X 10.6 before 10.6.3 or Apple Quicktime 7.6.6 and is prone to a buffer overflow vulnerability. A flaw is present in the applications, which fail to handle a crafted movie file with H.261 encoding. Successful exploitation could allow attackers to crash the serv ... oval:org.secpod.oval:def:3773 The host is installed with Apple Mac OS X 10.6 before 10.6.3 or Apple Quicktime 7.6.6 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle a crafted movie file with H.264 encoding. Successful exploitation could allow attackers to execute arbi ... oval:org.secpod.oval:def:3778 The host is installed with Apple Mac OS X 10.6 before 10.6.3 or Apple Quicktime 7.6.6 and is prone to a buffer overflow vulnerability. A flaw is present in the applications, which fail to handle a crafted genl atom in a QuickTime movie file with MPEG encoding. Successful exploitation could allow att ... oval:org.secpod.oval:def:3776 The host is installed with Apple Mac OS X 10.6 before 10.6.3 or Apple Quicktime 7.6.6 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle a crafted movie file with Sorenson encoding. Successful exploitation could allow attackers to crash the ... oval:org.secpod.oval:def:3777 The host is installed with Apple Mac OS X 10.6 before 10.6.3 or Apple Quicktime 7.6.6 and is prone to a buffer overflow vulnerability. A flaw is present in the applications, which fail to handle DELTA_FLI chunks and untrusted length values in a .fli file. Successful exploitation could allow attacker ... oval:org.secpod.oval:def:3768 The host is installed with Apple Quicktime before 7.7.6 or Apple Mac OS X 10.5.8 or 10.6 before 10.6.2 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted PICT image. Successful exploitation could allow attackers to crash ... oval:org.secpod.oval:def:20179 The host is installed with Apple Mac OS X or Server 10.8 through 10.8.5 or OS X 10.9 through 10.9.3 and is prone to uninitialized memory access vulnerability. The flaw is present in the application, which fails to properly handle DTLS messages in a TLS connection. Successful exploitation allows atta ... oval:org.secpod.oval:def:20180 The host is installed with Apple Mac OS X or Server 10.9 through 10.9.3 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle iBooks logs. Successful exploitation allows an attacker with access to a system may be able to recover Apple ID cred ... oval:org.secpod.oval:def:20181 The host is installed with Apple Mac OS X or Server 10.9 through 10.9.3 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly handle IOKit object. Successful exploitation allows an attacker bypass kernel address space layout randomization. oval:org.secpod.oval:def:20188 The host is installed with Apple Mac OS X or Server 10.9 through 10.9.3 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly kernel pointer stored in an IOKit object. Successful exploitation allows an attacker bypass kernel address space layout ... oval:org.secpod.oval:def:20186 The host is installed with Apple Mac OS X or Server 10.9 through 10.9.3 and is prone to heap buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle log messages. Successful exploitation allows local user to execute arbitrary code with system privileges. oval:org.secpod.oval:def:20187 The host is installed with Apple Mac OS X or Server 10.9 through 10.9.3 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to properly handle launchd. Successful exploitation allows local user to execute arbitrary code with system privileges. oval:org.secpod.oval:def:20184 The host is installed with Apple Mac OS X or Server 10.9 through 10.9.3 and is prone to integer underflow vulnerability. A flaw is present in the application, which fails to properly handle launchd. Successful exploitation allows local user to execute arbitrary code with system privileges. oval:org.secpod.oval:def:20185 The host is installed with Apple Mac OS X or Server 10.9 through 10.9.3 and is prone to heap buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle IPC messages. Successful exploitation allows local user to execute arbitrary code with system privileges. oval:org.secpod.oval:def:20182 The host is installed with Apple Mac OS X or Server 10.9 through 10.9.3 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly handle keystrokes. Successful exploitation could have allowed an attacker to type into windows under the screen lock. oval:org.secpod.oval:def:20183 The host is installed with Apple Mac OS X or Server 10.9 through 10.9.3 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle IOKit API arguments. Successful exploitation allows local user to cause an unexpected system restart. oval:org.secpod.oval:def:20170 The host is missing a security update according to Apple advisory, APPLE-SA-2014-06-30-2. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle certain objects and security vectors. Successful exploitation allows attackers to execute ... oval:org.secpod.oval:def:20177 The host is installed with Apple Mac OS X or Server 10.8 through 10.8.5 or OS X 10.9 through 10.9.3 and is prone to multiple null dereference vulnerabilities. The flaws is present in the application, which fails to properly handle kernel graphics drivers. Successful exploitation allows attackers to ... oval:org.secpod.oval:def:20178 The host is installed with Apple Mac OS X or Server 10.9 through 10.9.3 and is prone to arbitrary code execution vulnerability. The flaw is present in the application, which fails to properly handle IOThunderBoltController API calls. Successful exploitation allows execute arbitrary code with system ... oval:org.secpod.oval:def:20175 The host is installed with Apple Mac OS X or Server 10.8 through 10.8.5 or OS X 10.9 through 10.9.3 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle IOAcceleratorFamily. Successful exploitation allows attackers to execute ar ... oval:org.secpod.oval:def:20176 The host is installed with Apple Mac OS X or Server 10.8 through 10.8.5 or OS X 10.9 through 10.9.3 and is prone to out-of-bounds vulnerability. A flaw is present in the application, which fails to properly handle a system call. Successful exploitation allows local user to bypass kernel address spac ... oval:org.secpod.oval:def:20173 The host is installed with Apple Mac OS X or Server 10.8 through 10.8.5 or OS X 10.9 through 10.9.3 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle OpenGL API call. Successful exploitation allows attackers to execute arbitr ... oval:org.secpod.oval:def:20174 The host is installed with Apple Mac OS X or Server 10.8 through 10.8.5 or OS X 10.9 through 10.9.3 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle OpenCL API call. Successful exploitation allows attackers to bypass kernel ... oval:org.secpod.oval:def:20171 The host is installed with Apple Mac OS X or Server 10.7 through 10.7.5, OS X 10.8 through 10.8.5 or OS X 10.9 through 10.9.3 and is prone to out-of-bounds vulnerability. A flaw is present in the application, which fails to properly handle AppleDouble files in zip archives. Successful exploitation m ... oval:org.secpod.oval:def:20172 The host is installed with Apple Mac OS X or Server 10.7 through 10.7.5, OS X 10.8 through 10.8.5 or OS X 10.9 through 10.9.3 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle Dock's messages from applications. Successful exp ... oval:org.secpod.oval:def:37316 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code. oval:org.secpod.oval:def:37315 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle firewall prompts. Successful exploitation could allow remote attackers to cause a denial of service. oval:org.secpod.oval:def:37314 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with kernel privileg ... oval:org.secpod.oval:def:37313 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with kernel privileg ... oval:org.secpod.oval:def:37312 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with system ... oval:org.secpod.oval:def:37311 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with kernel privileg ... oval:org.secpod.oval:def:37310 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with kernel p ... oval:org.secpod.oval:def:37309 The host is installed with Apple Mac OS X or Server 10.11.6 or macOS Server before 5.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle HTTP_PROXY environment variable. Successful exploitation could allow remote attackers ... oval:org.secpod.oval:def:37352 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an untrusted pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ke ... oval:org.secpod.oval:def:37351 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an out of bounds read vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to determine kernel memory layout or may dis ... oval:org.secpod.oval:def:37350 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with kernel privileg ... oval:org.secpod.oval:def:37354 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code. oval:org.secpod.oval:def:37353 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ke ... oval:org.secpod.oval:def:37341 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a security feature bypass vulnerability. A flaw is present in the application, which fails to properly handle parsing of environment variables. Successful exploitation could allow remote attackers to bypass the taint protect ... oval:org.secpod.oval:def:37340 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle timing side channel. Successful exploitation could allow remote attackers to determine the existence of user accou ... oval:org.secpod.oval:def:37349 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an out of bounds read vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to determine kernel memory layout or may dis ... oval:org.secpod.oval:def:37348 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an out of bounds read vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to determine kernel memory layout or may dis ... oval:org.secpod.oval:def:37347 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle lock. Successful exploitation could allow remote attackers to cause a denial of service. oval:org.secpod.oval:def:37346 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly parse directory paths. Successful exploitation could allow remote attackers to access restricted files. oval:org.secpod.oval:def:37345 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle .bash_history and .bash_session. Successful exploitation could allow remote attackers to leak sensitive user infor ... oval:org.secpod.oval:def:37344 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with system privi ... oval:org.secpod.oval:def:37343 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle key derivation. Successful exploitation could allow remote attackers to leak memory. oval:org.secpod.oval:def:37342 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with kernel privileg ... oval:org.secpod.oval:def:37339 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle state management in NSSecureTextField. Successful exploitation could allow remote attackers to leak a user's credenti ... oval:org.secpod.oval:def:37330 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to properly handle Call Relay. Successful exploitation could allow remote attackers in a privileged network position may be able to cause a denial o ... oval:org.secpod.oval:def:37338 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle VMnet.framework enabled a DNS proxy listening on all network interfaces. Successful exploitation could allow remot ... oval:org.secpod.oval:def:37335 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with kernel privileg ... oval:org.secpod.oval:def:37334 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with kernel privileg ... oval:org.secpod.oval:def:37333 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted web content . Successful exploitation could allow remote attackers to disclosure process memory. oval:org.secpod.oval:def:37332 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a NULL pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with kernel p ... oval:org.secpod.oval:def:37331 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with kernel privileg ... oval:org.secpod.oval:def:37329 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle font files. Successful exploitation could allow remote attackers may result in disclosure of process memory. oval:org.secpod.oval:def:37328 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle scoped bookmarks. Successful exploitation could allow remote attackers to cause a denial of service. oval:org.secpod.oval:def:37327 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle diskutil. Successful exploitation could allow remote attackers to execute arbitrary code with system privileges. oval:org.secpod.oval:def:37326 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle .GlobalPreferences file. Successful exploitation could allow remote attackers to determine a user's current locati ... oval:org.secpod.oval:def:37325 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle session management. Successful exploitation could allow remote attackers to view another user's screen. oval:org.secpod.oval:def:37324 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code. oval:org.secpod.oval:def:37323 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle corecrypto. Successful exploitation could allow remote attackers to disclose sensitive plaintext if the output and ... oval:org.secpod.oval:def:37322 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to gain root privileges. oval:org.secpod.oval:def:37321 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to gain root privileges. oval:org.secpod.oval:def:37320 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly parse the set-cookie header. Successful exploitation could allow remote attackers to disclose information. oval:org.secpod.oval:def:37318 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly validate input. Successful exploitation could allow remote attackers to cause a system denial of service. oval:org.secpod.oval:def:37317 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code. oval:org.secpod.oval:def:37362 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected application termination or arbitrary code execut ... oval:org.secpod.oval:def:60009 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to perform arbitrary co ... oval:org.secpod.oval:def:60008 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a bounds check issue. Successful exploitation allows an attacker to perform a denial of service a ... oval:org.secpod.oval:def:60005 The host is installed with Apple Mac OS X 10.15.x before 10.15.2 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a state related issue. Successful exploitation allows an attacker to initiate calls made by Suri using the wrong cell ... oval:org.secpod.oval:def:60006 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a checks related issue. Successful exploitation allows an attacker to gain elevated privileg ... oval:org.secpod.oval:def:60003 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to an arbitrary code vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to execute arbitrary code w ... oval:org.secpod.oval:def:60004 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to read restricted memory. oval:org.secpod.oval:def:60017 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to execute arbitr ... oval:org.secpod.oval:def:60012 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in OpenLDAP. Successful exploitation allows an attacker to encounter multiple issues ... oval:org.secpod.oval:def:60010 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to execute arbitr ... oval:org.secpod.oval:def:46325 The host is installed with Apple Mac OS X 10.13.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle cookie management issues. Successful exploitation may cause cookies to unexpectedly persist. oval:org.secpod.oval:def:50280 The host is installed with Apple Mac OS X 10.14.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to circumvent sandbox restrictions. oval:org.secpod.oval:def:50283 The host is installed with Apple Mac OS X 10.13.6 or 10.14.2 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle a bounds checking issue. Successful exploitation allows an attacker to elevate privileges through a malicious applica ... oval:org.secpod.oval:def:44862 The host is installed with Apple Mac OS X 10.11.6 or 10.12.6 or 10.13.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle improper validation. Successful exploitation allows an application to elevate privileges. oval:org.secpod.oval:def:46329 The host is installed with Apple Mac OS X 10.11.6 or 10.12.6 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle memory corruption issues. On successful exploitation, a malicious application may be able to break out of its sandbox. oval:org.secpod.oval:def:68537 The host is installed with Xcode before 12.4 on Apple Mac OS X 10.15.4 or later and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to access arbitrary files on th ... oval:org.secpod.oval:def:68538 The host is missing a security update according to the Apple advisory APPLE-SA-2021-01-26-4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to access arbitrary ... oval:org.secpod.oval:def:71499 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to read restricted memory ... oval:org.secpod.oval:def:71498 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a permissions issue. Successful exploitation allows an attacker to modify protected p ... oval:org.secpod.oval:def:71497 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a path traversal vulnerability. A flaw is present in the application, which fails to properly handle a path validation issue. Successful exploitation allows an attacker to modify protected par ... oval:org.secpod.oval:def:71455 The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allows an attacker to bypass Gatekeeper checks. oval:org.secpod.oval:def:71454 The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a path traversal vulnerability. A flaw is present in the application, which fails to properly handle a path validation issue. Successful exploitation allows an attacker to modify protected parts of the ... oval:org.secpod.oval:def:71457 The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle an entitlements issue. Successful exploitation allows an attacker to gain elevated privileges. oval:org.secpod.oval:def:71456 The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an entitlements issue. Successful exploitation allows an attacker with root privileges to a ... oval:org.secpod.oval:def:71506 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to elevate their privileg ... oval:org.secpod.oval:def:71503 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to cause unexpected syste ... oval:org.secpod.oval:def:71502 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to gain root privilege ... oval:org.secpod.oval:def:71505 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a permissions logic issue. Successful exploitation allows attackers to elevate their ... oval:org.secpod.oval:def:71504 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle a bounds checking issue. Successful exploitation allows an attacker to execute arbitr ... oval:org.secpod.oval:def:71501 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. Successful exploitation allows an attacker to disclose p ... oval:org.secpod.oval:def:71500 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to read restricted memory ... oval:org.secpod.oval:def:71507 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle improper checks. Successful exploitation allows an attacker to cause arbitrary c ... oval:org.secpod.oval:def:71509 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allows an attacker to execute arbitrary c ... oval:org.secpod.oval:def:71508 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to cause unexpected appli ... oval:org.secpod.oval:def:71518 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a race condition ulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to gain root privileges. oval:org.secpod.oval:def:71517 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to an out-of-bounds vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to cause arbitrary co ... oval:org.secpod.oval:def:71514 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a double free vulnerability. A flaw is present in the application, which fails to properly handle a memory management issue. Successful exploitation allows an attacker to cause heap corruption ... oval:org.secpod.oval:def:71513 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an API issue in Accessibility TCC permissions. Successful exploitation allows an atta ... oval:org.secpod.oval:def:71516 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to leak sensitive ... oval:org.secpod.oval:def:71515 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to an A use after free vulnerability. A flaw is present in the application, which fails to properly handle a memory management issue. Successful exploitation allows an attacker to cause arbitrary ... oval:org.secpod.oval:def:71510 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a memory initialization vulnerability. A flaw is present in the application, which fails to properly handle a memory issue. Successful exploitation allows an attacker to disclose sensitive use ... oval:org.secpod.oval:def:71512 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allows attackers to elevate their privileges. oval:org.secpod.oval:def:71511 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a memory initialization vulnerability. A flaw is present in the application, which fails to properly handle a memory issue. Successful exploitation allows an attacker to disclose kernel memory ... oval:org.secpod.oval:def:60002 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues. oval:org.secpod.oval:def:17525 The host is installed with Apple Mac OS X or Server 10.7.5, OS X 10.8.5 or OS X 10.9.2 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle the conversion of a string to a floating point value. Successful exploitation allows a ... oval:org.secpod.oval:def:24065 The host is installed with Xcode before 6.2 on Apple Mac OS X 10.9.4 or later and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to handle a crafted certificate. Successful exploitation could allow man-in-the-middle attackers to spoof servers. oval:org.secpod.oval:def:24066 The host is installed with Xcode before 6.2 on Apple Mac OS X 10.9.4 or later and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a crafted authentication realm. Successful exploitation could allow remote servers to obtain the credentials. oval:org.secpod.oval:def:17524 The host is installed with Apple Mac OS X 10.9.2 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to properly handle YAML tags. Successful exploitation allows attackers to cause an unexpected application termination or arbitrary code execution. oval:org.secpod.oval:def:24067 The host is installed with Xcode before 6.2 on Apple Mac OS X 10.9.4 or later and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a REPORT request for a resource that does not exist. Successful exploitation could allow remote remote attacker ... oval:org.secpod.oval:def:24068 The host is installed with Xcode before 6.2 on Apple Mac OS X 10.9.4 or later and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a request for a URI that triggers a lookup for a virtual transaction name that does not exist. Successful explo ... oval:org.secpod.oval:def:24064 The host is missing a security update according to Apple advisory, APPLE-SA-2015-03-09-4. The update is required to fix multiple vulnerabilities. A flaw is present in the application, which fails to handle crafted vectors. Successful exploitation could allow attackers to spoof SSL servers or add une ... oval:org.secpod.oval:def:4292 The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle crafted compressed data. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:60001 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues. oval:org.secpod.oval:def:60000 The host is installed with Apple Mac OS X 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues. oval:org.secpod.oval:def:71494 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle improper checks. Successful exploitation allows a remote attacker to cause a denial of s ... oval:org.secpod.oval:def:71490 The host is missing a security update according to Apple advisory, APPLE-SA-2021-04-26-4. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle multiple issues. Successful exploitation allow attackers to execute arbitrary code. oval:org.secpod.oval:def:71495 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle an imput validation issue. Successful exploitation allows an attacker to cause a denial of ... oval:org.secpod.oval:def:71496 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to properly handle improper checks. Successful exploitation allows an attacker to provide a fraudulent OCSP response ... oval:org.secpod.oval:def:37307 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to multiple security information disclosure vulnerability. The flaws are present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to compromise securit ... oval:org.secpod.oval:def:14172 The host is installed with Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which does not properly restrict the capabilities of the XML parser. Successful exploitation could allow an attacker to ex ... oval:org.secpod.oval:def:14173 The host is installed with Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which does not properly handle encoded : (colon) characters in URLs. Successful exploitation could allow an attacker to ... oval:org.secpod.oval:def:14156 The host is installed with Apple Mac OS X Server 10.6.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which does not properly consider differences in parameter handling. Successful exploitation could allow an attacker to execute arbitrary code. oval:org.secpod.oval:def:14157 The host is installed with Apple Mac OS X Server 10.6.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted request. Successful exploitation could allow an attacker to execute arbitrary code. oval:org.secpod.oval:def:15485 The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to buffer overflow vulnerability. The flaw is present in the in the php_quot_print_encode function in ext/standard/quot_print.c in PHP before 5. ... oval:org.secpod.oval:def:14158 The host is installed with Apple Mac OS X Server 10.6.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle crafted serialized attributes. Successful exploitation could allow an attacker to execute arbitrary code. oval:org.secpod.oval:def:15489 The host is installed with Apple Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to unspecified vulnerability. The flaw is present in the PostgreSQL, 9.2.x before 9.2.4, 9.1.x before 9.1.9, 9.0.x before 9.0.13, 8.4.x before 8.4.17, and 8.3.x before 8.3.23, ... oval:org.secpod.oval:def:14159 The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.2 and is prone to buffer overflow vulnerability. A flaw is present in the application which fails to handle a crafted PICT image. Successful exploitation could allow a ... oval:org.secpod.oval:def:14152 The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.3, Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to han ... oval:org.secpod.oval:def:14167 The host is installed with OS X Mountain Lion 10.8 through 10.8.3 is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted MP3 file . Successful exploitation could allow an attacker to execute arbitrary code. oval:org.secpod.oval:def:14168 The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.3 and is prone to remote code execution vulnerability.A flaw is present in the application which fails to handle unspecified vectors . Successful exploitation could al ... oval:org.secpod.oval:def:14165 The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.3, Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a a c ... oval:org.secpod.oval:def:14166 The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.3, Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle a craft ... oval:org.secpod.oval:def:14169 The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.3 and is prone to denial of service vulnerability . A flaw is present in the application, which does not properly initialize memory during the processing of text track ... oval:org.secpod.oval:def:15490 The host is installed with Apple Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to password disclosure vulnerability. The flaw is present in the PostgreSQL, possibly 9.2.x before 9.2.4, 9.1.x before 9.1.9, 9.0.x before 9.0.13, 8.4.x before 8.4.17, and 8.3. ... oval:org.secpod.oval:def:14160 The host is installed with OS X Mountain Lion 10.8 through 10.8.3 and is prone to information disclosure vulnerability. A flaw is present in the application, which does not prevent storage of permanent cookies. Successful exploitation could allow an attacker to execute arbitrary code. oval:org.secpod.oval:def:15491 The host is installed with Apple Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to security bypass vulnerability. The flaw is present in the Power Management in Apple Mac OS X before 10.8.5, which does not properly perform locking upon occurrences of a power assertion. Successful exploitati ... oval:org.secpod.oval:def:14163 The host is installed with OS X Mountain Lion 10.8 through 10.8.3 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly authenticate attempts to disable FileVault. Successful exploitation could allow an attacker to execute arbitrary code. oval:org.secpod.oval:def:14164 The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.3, Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle cra ... oval:org.secpod.oval:def:14161 The host is installed with OS X Mountain Lion 10.8 through 10.8.3 and is prone to stack consumption vulnerability. A flaw is present in the application which fails to properly handle text glyphs. Successful exploitation could allow an attacker to execute arbitrary code. oval:org.secpod.oval:def:15492 The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to denial of service vulnerability. The flaw is present in the QuickTime in Apple Mac OS X before 10.8.5, which fails to handle a crafted idsc a ... oval:org.secpod.oval:def:14162 The host is installed with Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to directory service vulnerability. A flaw is present in the application which doesn't handle directory server's messages from the network. Successful exploitation could allow an attacker to execute arbitra ... oval:org.secpod.oval:def:15493 The host is installed with Apple Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to security bypass vulnerability. The flaw is present in the Screen Lock in Apple Mac OS X before 10.8.5 , which does not properly track sessions. Successful exploitation allows remote authenticated users to byp ... oval:org.secpod.oval:def:15469 The host is installed with Apple Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to denial of service vulnerability. The flaw is present in the ISC BIND 9.8.x before 9.8.4-P1 and 9.9.x before 9.9.2-P1, when DNS64 is enabled, which fails to handle a crafted ... oval:org.secpod.oval:def:15462 The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to arbitrary code execution vulnerability. The flaw is present in the envvars (aka envvars-std) in the Apache HTTP Server before 2.4.2, which pl ... oval:org.secpod.oval:def:14145 The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.3, Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to information disclosure vulnerability. A flaw is present in the application, which performs a M ... oval:org.secpod.oval:def:15476 The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to information disclosure vulnerability. The flaw is present in the The IPSec implementation in Apple Mac OS X before 10.8.5, when Hybrid Auth i ... oval:org.secpod.oval:def:14146 The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.3, Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to information disclosure vulnerability. A flaw is present in the application, which performs a M ... oval:org.secpod.oval:def:15477 The host is installed with Apple Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to denial of service vulnerability. The flaw is present in the the kernel in Apple Mac OS X before 10.8.5, which fails to handle crafted IGMP packets that leverage incorrect, extraneous code in the IGMP parser. ... oval:org.secpod.oval:def:14143 The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.3, Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to information disclosure vulnerability. A flaw is present in the application, which does not ini ... oval:org.secpod.oval:def:15474 The host is installed with Apple Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to buffer overflow vulnerability. The flaw is present in ImageIO in Apple Mac OS X before 10.8.5, which fails to handle crafted JPEG2000 data in a PDF document. Successful exploitation allows remote attackers to ... oval:org.secpod.oval:def:14144 The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.3, Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to information disclosure vulnerability. A flaw is present in the application, which does not ens ... oval:org.secpod.oval:def:15475 The host is installed with Apple Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to security-bypass vulnerability. The flaw is present in the Installer in Apple Mac OS X before 10.8.5 provides an option to continue a package's installation after encounterin ... oval:org.secpod.oval:def:14149 The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.3, Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to information disclosure vulnerability. A flaw is present in the application, which does not pro ... oval:org.secpod.oval:def:14147 The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.3, Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to information disclosure vulnerability. A flaw is present in the application, which does not pro ... oval:org.secpod.oval:def:15478 The host is installed with Apple Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to information disclosure vulnerability. The flaw is present in the mdmclient in Mobile Device Management in Apple Mac OS X before 10.8.5, which places a password on the comman ... oval:org.secpod.oval:def:14148 The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.3, Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to pro ... oval:org.secpod.oval:def:15472 The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5 and is prone to remote code execution vulnerability. The flaw is present in pdf.c in ClamAV 0.97.1 through 0.97.7, which fails to handle a crafted length value in an encrypted PDF file. Successful expl ... oval:org.secpod.oval:def:14142 The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.3, Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to pro ... oval:org.secpod.oval:def:15473 The host is installed with Apple Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to buffer overflow vulnerability. The flaw is present in CoreGraphics in Apple Mac OS X before 10.8.5, which fails to handle crafted JBIG2 data in a PDF document. Successful exploitation allows remote attackers ... oval:org.secpod.oval:def:15471 The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5 and is prone to remote code execution vulnerability. The flaw is present in the Integer underflow in the cli_scanpe function in pe.c in ClamAV before 0.97.8, which fails to handle a skewed offset large ... oval:org.secpod.oval:def:2722 The is host missing a security update according to APPLE-SA-2011-04-14-4. The update is required to fix an information disclosure vulnerability. A flaw is present in the application, which fails to identify fraudulent SSL certificates. Successful exploitation could allow attackers to gain user crede ... oval:org.secpod.oval:def:39597 The host is installed with Apple Mac OS X 10.8 before 10.13 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle crafted CONTINUATION frames in an HTTP/2 request. Successful exploitation could allow attackers to execute arbitrary cod ... oval:org.secpod.oval:def:39598 The host is installed with Apple Mac OS X 10.8 before 10.13 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:64598 The host is installed with Apple Mac OS X 10.13.6 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle bounds check issue. Successful exploitation allows an attacker to cause arbitrary code execution. oval:org.secpod.oval:def:39599 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle crafted EXIF data. Successful exploitation could allow attackers to divide the minimum representable negative integer by ... oval:org.secpod.oval:def:39593 The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted JPEG file. Successful exploitation could allow attackers to execute arbitrary code ... oval:org.secpod.oval:def:39594 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a padding oracle attack vulnerability. A flaw is present in the application, which fails to properly handle mod_session_crypto module. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39595 The host is installed with Apple Mac OS X or Server 10.8 before 10.13 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle LibreSSL. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:64591 The host is installed with Apple Mac OS X 10.13.6 or 10.14.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle checks issue. Successful exploitation allows a remote attacker to cause arbitrary code execution. oval:org.secpod.oval:def:40594 The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:40597 The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to read restricted memory. oval:org.secpod.oval:def:40598 The host is installed with Apple Mac OS X or Server 10.12.4 or 10.11.6 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly handle filesystem restrictions. Successful exploitation could allow attackers togain system privileges. oval:org.secpod.oval:def:40595 The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly perform certificate validation. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:40596 The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to gain system privileges. oval:org.secpod.oval:def:40599 The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly perform input sanitization. Successful exploitation could allow attackers to read restricted memory. oval:org.secpod.oval:def:14277 The host is installed with Apple Mac OS X 10.8.x and is prone to security bypass vulnerability. The flaw is present in the fill_pipeinfo function in bsd/kern/sys_pipe.c in the XNU kernel, which does not properly handle PROC_PIDFDPIPEINFO option to the proc_info system call for a kernel pipe handle. ... oval:org.secpod.oval:def:14278 The host is installed with Apple Mac OS X 10.8.x and is prone to security bypass vulnerability. The flaw is present in the posix_spawn system call in the XNU kernel, which does not prevent use of the _POSIX_SPAWN_DISABLE_ASLR and _POSIX_SPAWN_ALLOW_DATA_EXEC flags for setuid and setgid programs. Su ... oval:org.secpod.oval:def:14275 The host is installed with Apple Mac OS X 10.8.x and is prone to information disclosure vulnerability. The flaw is present in the posix_spawn system call in the XNU kernel, which does not properly validate the data for file actions and port actions. Successful exploitation allows local users to caus ... oval:org.secpod.oval:def:14276 The host is installed with Apple Mac OS X 10.8.x and is prone to information disclosure vulnerability. The flaw is mach_port_space_info function in osfmk/ipc/mach_debug.c in the XNU kernel, which does not initialize a certain structure member. Successful exploitation allows local users to obtain sen ... oval:org.secpod.oval:def:14259 The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4, and is prone to buffer overflow vulnerability. The flaw is present in the QuickTime, which fails to handle a crafted movie file with Sorenson encoding. Succ ... oval:org.secpod.oval:def:14262 The host is missing an important security update according to Apple advisory, APPLE-SA-2013-07-02-1. The update is required to fix multiple vulnerabilities. The flaws are present in the QuickTime, which fails to handle a crafted movie file. Successful exploitation could allow attackers to crash the ... oval:org.secpod.oval:def:14260 The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4, and is prone to buffer overflow vulnerability. The flaw is present in the QuickTime, which fails to handle a crafted movie file with H.264 encoding. Success ... oval:org.secpod.oval:def:14261 The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4, and is prone to buffer overflow vulnerability. The flaw is present in the QuickTime, which fails to handle crafted mvhd atoms in a movie file. Successful ex ... oval:org.secpod.oval:def:2860 The host is installed with Apple Mac OS X 10.5.8 or 10.6 through 10.6.8 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to validate patch files. Successful exploitation could allow attackers to create or overwrite arbitrary files. oval:org.secpod.oval:def:2861 The host is installed with Apple Mac OS X 10.6 through 10.6.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle Microsoft office files. Successful exploitation could allow attackers to execute arbitrary code or crash the service. oval:org.secpod.oval:def:2863 The host is installed with Apple Mac OS X 10.5.8 or 10.6 through 10.6.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle file descriptor's. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:2865 The host is installed with Apple Mac OS X 10.5.8 or 10.6 through 10.6.7 and is prone to a denial of service vulnerability. A flaw is present in the application, as it fails to handle lock tokens sent over http. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:2874 The host is installed with Apple Mac OS X 10.6 through 10.6.7 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle a NULL return value. Successful exploitation may have unspecified impact. oval:org.secpod.oval:def:2877 The host is installed with Apple Mac OS X 10.6 through 10.6.7 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to prevent modification of the ciphersuite in the session cache. Successful exploitation could allow attackers to discover a sessio ... oval:org.secpod.oval:def:2879 The host is installed with Apple Mac OS X 10.5.8 or 10.6 through 10.6.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a glob pattern from an untrusted application. Successful exploitation may allow attackers to crash the service. oval:org.secpod.oval:def:2878 The host is installed with Apple Mac OS X 10.6 through 10.6.7 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle an out-of-bounds memory access. Successful exploitation could allow attackers to obtain sensitive information. oval:org.secpod.oval:def:2846 The host is installed with Apple Mac OS X 10.5.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle the Wi-Fi frames. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:2848 The host is installed with Apple Mac OS X 10.6 through 10.6.7 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the application, as it fails to handle the TrueType fonts. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:2847 The host is installed with Apple Mac OS X before 10.6.8 and is prone to an information disclosure vulnerability. A flaw is present in the application, which creates a log entry containing user's AppleID password. Successful exploitation may allow remote attackers to obtain sensitive information. oval:org.secpod.oval:def:2852 The host is installed with Apple Mac OS X 10.5.8 or 10.6.0 through 10.6.7 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle Type 1 fonts. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:2855 The host is installed with Apple Mac OS X 10.5.8 or 10.6 through 10.6.7 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle JPEG2000 images. Successful exploitation could allow attackers to execute arbitrary code or crash the servic ... oval:org.secpod.oval:def:2857 The host is installed with Apple Mac OS X 10.6 through v10.6.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle the IPV6 sockets. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:2859 The host is installed with Apple Mac OS X 10.6 through 10.6.7 and is prone to an information disclosure vulnerability. A flaw is present in the application, which uses cleartext HTTP session to read e-mail addresses. Successful exploitation could allow a privileged attacker to retrieve an user's ema ... oval:org.secpod.oval:def:2858 The host is installed with Apple Mac OS X 10.5.8 or 10.6 through 10.6.7 and is prone to an information disclosure vulnerability. A flaw is present in the application, which discloses the addresses of heap buffer. Successful exploitation could allow attackers to disclose sensitive information. oval:org.secpod.oval:def:39610 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly validate input. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39611 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted .dfont file. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39612 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an infinite recursion. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:39613 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted .mov file. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39614 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted font file. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39615 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to disclose process memory. oval:org.secpod.oval:def:39605 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation could allow attackers to execute arbitrary code with kernel privileges. oval:org.secpod.oval:def:39606 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly validate input. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39607 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly validate input. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39608 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly validate input. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39609 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly validate input. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39603 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an empty boolean element. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:39604 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:16091 The host is missing an important security update according to Apple advisory, APPLE-SA-2013-10-03-1. The update is required to fix security bypass vulnerability. The flaw is present in the Directory Services, which fails to handle a crafted application. Successful exploitation allows local users to ... oval:org.secpod.oval:def:16092 The host is installed with Apple Mac OS X Mountain Lion 10.8 to v10.8.5 and is prone to security bypass vulnerability. The flaw is present in Directory Services, which fails to handle a crafted application. Successful exploitation allows local users to bypass password-based authentication and modify ... oval:org.secpod.oval:def:2881 The host is missing an update according to Apple advisory APPLE-SA-2011-05-31-1. The update is required to fix a security bypass vulnerability. A flaw is present in the application, which fails to detect malware. Successful exploitation allows attackers to launch a malware and retrieve sensitive inf ... oval:org.secpod.oval:def:39652 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly perform memory handling. Successful exploitation could allow attackers to execute arbitrary code with system privileges. oval:org.secpod.oval:def:39657 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39658 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted zip archives. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39659 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted media file. Successful exploitation could allow attackers to execute arbitrary code or crash the service. oval:org.secpod.oval:def:39650 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a man-in-the-middle attack vulnerability. A flaw is present in the application, which fails to properly perform cleanup. Successful exploitation could allow attackers to bypass certificate pinning. oval:org.secpod.oval:def:39651 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to disclose process memory. oval:org.secpod.oval:def:39641 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39642 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an off-by-one vulnerability. A flaw is present in the application, which fails to properly perform bounds checking. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39643 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39644 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly perform memory handling. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39645 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly perform memory handling. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:64601 The host is installed with Apple Mac OS X 10.15.5 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle bounds check issue. Successful exploitation allows an attacker to execute arbitrary code with kernel privileges through a malici ... oval:org.secpod.oval:def:39646 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly perform bounds checking. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:64602 The host is installed with Apple Mac OS X 10.15.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a data protection issue. Successful exploitation allows an attacker to leak sensitive user information. oval:org.secpod.oval:def:39647 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation could allow a local attacker to change file system. oval:org.secpod.oval:def:39648 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly perform memory management. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:64605 The host is installed with Apple Mac OS X 10.15.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows a remote attacker to cause a limited out-of-bounds write, resulting in a ... oval:org.secpod.oval:def:64608 The host is installed with Apple Mac OS X 10.15.5 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allows an attacker to execute arbitrary code with kernel privileges through an appl ... oval:org.secpod.oval:def:64609 The host is installed with Apple Mac OS X 10.15.5 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows a remote attacker to cause unexpected system termination or corrupt ke ... oval:org.secpod.oval:def:39640 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly perform memory management. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39638 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39639 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39630 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted image. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:39631 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted image. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39632 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted image. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39633 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted image. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39634 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:39635 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39636 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39637 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39627 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39628 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39629 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted image. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:39620 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39621 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39622 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39623 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an out-of-bounds read vulnerability. The flaws are present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39624 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle malicious HTTP/2 server. Successful exploitation could allow attackers to cause undefined behavior. oval:org.secpod.oval:def:39625 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly perform state management. Successful exploitation could allow attackers to unexpectedly leak the CR8 control register bet ... oval:org.secpod.oval:def:39626 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly perform URL handling. Successful exploitation could allow attackers to disclose local files. oval:org.secpod.oval:def:39616 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to lead to resource exhaustion. oval:org.secpod.oval:def:39617 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle bounds checking. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39618 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle DMA. Successful exploitation could allow attackers to recover the FileVault 2 encryption password. oval:org.secpod.oval:def:39619 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a permission handling vulnerability. A flaw is present in the application, which fails to properly handle improper permission controls. Successful exploitation could allow attackers to reset permissions when sending links. oval:org.secpod.oval:def:39696 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39697 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39698 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39699 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:40601 The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly perform path validation. Successful exploitation could allow attackers to execute arbitrary code with root privileges. oval:org.secpod.oval:def:40602 The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation could allow attackers to escape its sandbox. oval:org.secpod.oval:def:40600 The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted book. Successful exploitation could allow attackers open arbitrary websites without user permissi ... oval:org.secpod.oval:def:40605 The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly perform input sanitization. Successful exploitation could allow attackers to read restricted memory. oval:org.secpod.oval:def:40606 The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation could allow attackers to gain kernel privileges. oval:org.secpod.oval:def:39690 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:40603 The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to gain kernel privileges. oval:org.secpod.oval:def:39691 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:40604 The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to gain kernel privileges. oval:org.secpod.oval:def:39692 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:40609 The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly perform input sanitization. Successful exploitation could allow attackers to read restricted memory. oval:org.secpod.oval:def:39693 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39694 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:40607 The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly perform locking. Successful exploitation could allow attackers to execute arbitrary code with kernel privileges. oval:org.secpod.oval:def:39695 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:40608 The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly perform input sanitization. Successful exploitation could allow attackers to read restricted memory. oval:org.secpod.oval:def:39685 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39686 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39687 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39688 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39689 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:40612 The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly perform input sanitization. Successful exploitation could allow attackers to read restricted memory. oval:org.secpod.oval:def:40613 The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation could allow attackers to gain kernel privileges. oval:org.secpod.oval:def:40610 The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly perform input sanitization. Successful exploitation could allow attackers to read restricted memory. oval:org.secpod.oval:def:40611 The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly perform input sanitization. Successful exploitation could allow attackers to read restricted memory. oval:org.secpod.oval:def:40616 The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to make an application to escape sandbox ... oval:org.secpod.oval:def:40617 The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12.4 and is prone to a resource exhaustion vulnerability. A flaw is present in the application, which fails to properly handle crafted input. Successful exploitation could allow attackers to make an application to escape sand ... oval:org.secpod.oval:def:40614 The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation could allow attackers to gain kernel privileges. oval:org.secpod.oval:def:39680 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:40615 The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation could allow attackers to gain kernel privileges. oval:org.secpod.oval:def:39681 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39682 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39683 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:40618 The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an access issue. Successful exploitation could allow attackers to make an application to escape sandbox restrictions. oval:org.secpod.oval:def:39684 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:40619 The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation could allow attackers to make an application to escape sandbox restrictions. oval:org.secpod.oval:def:39674 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39675 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:40620 The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted SQL query. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39676 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39677 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39678 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:40623 The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted SQL query. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39679 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:40624 The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle crafted SQL query. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:40621 The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted SQL query. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:40622 The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted SQL query. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:40627 The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:40628 The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:40625 The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle crafted SQL query. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:40626 The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39670 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39671 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39672 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:40629 The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39673 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39663 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle input validation. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:40630 The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly perform input sanitization. Successful exploitation could allow attackers to read restricted memory. oval:org.secpod.oval:def:39664 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a double free vulnerability. A flaw is present in the application, which fails to properly perform memory management. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:40631 The host is missing a security update according to Apple advisory, APPLE-SA-2017-05-15-3. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary ... oval:org.secpod.oval:def:39665 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly perform permissions checking. Successful exploitation could allow attackers to unexpectedly escalate privileges using sudo. oval:org.secpod.oval:def:39666 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly perform validation during the installation process. Successful exploitation could allow attackers to modify protected disk l ... oval:org.secpod.oval:def:39667 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39668 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39669 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39660 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle cryptographic API calls. Successful exploitation could allow attackers to validate empty signatures. oval:org.secpod.oval:def:39661 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly validate the authenticity of OTR packets. Successful exploitation could allow attackers to capture or modify data in session ... oval:org.secpod.oval:def:39662 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle bounds checking. Successful exploitation could allow attackers to execute arbitrary code with root privileges. oval:org.secpod.oval:def:39715 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an address bar spoofing vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39716 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39717 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:57581 The host is installed with Apple Mac OS X 10.14.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to read restricted memory through an application. oval:org.secpod.oval:def:57585 The host is installed with Apple Mac OS X 10.14.5 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to cause unexpected application termination or arbit ... oval:org.secpod.oval:def:57584 The host is installed with Apple Mac OS X 10.14.5 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to properly handle a memory management issue. Successful exploitation allows an attacker to read restricted memory through an application. oval:org.secpod.oval:def:57583 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.5 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to cause arbitrary code executio ... oval:org.secpod.oval:def:57582 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.5 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a issue in gatekeeper. Successful exploitation allows an attacker to bypass gatekeeper while extracting a zip fi ... oval:org.secpod.oval:def:57589 The host is installed with Apple Mac OS X 10.14.5 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to execute arbitrary code with system privileges. oval:org.secpod.oval:def:57588 The host is installed with Apple Mac OS X 10.12.6, 10.13.6, 10.14.5 or 10.14.6 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to cause unexpected applicati ... oval:org.secpod.oval:def:57587 The host is installed with Apple Mac OS X 10.14.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a checks issue. Successful exploitation allows an attacker to leak memory. oval:org.secpod.oval:def:57586 The host is installed with Apple Mac OS X 10.14.5 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to execute arbitrary code. oval:org.secpod.oval:def:39704 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39705 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39706 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39707 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39700 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:57592 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.5 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a checks issue. Successful exploitation allows an attacker to perform unauthorized actions by intercepting commu ... oval:org.secpod.oval:def:39701 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:57591 The host is installed with Apple Mac OS X 10.13.6 or 10.14.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to read restricted memory. oval:org.secpod.oval:def:39702 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:57590 The host is installed with Apple Mac OS X 10.13.6 or 10.14.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to read restricted memory. oval:org.secpod.oval:def:39703 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:57595 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.5 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to properly handle a checks issue. Successful exploitation allows an attacker to trigger a use-after-free in an application deserial ... oval:org.secpod.oval:def:57593 The host is installed with Apple Mac OS X 10.14.5 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to execute arbitrary code with kernel privileges. oval:org.secpod.oval:def:57599 The host is installed with Apple Mac OS X 10.14.5 and is prone to an inconsistent user interface vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. Successful exploitation allows an attacker to alter the encryption status of a Time Machine b ... oval:org.secpod.oval:def:57598 The host is installed with Apple Mac OS X 10.14.5 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to leak memory. oval:org.secpod.oval:def:57597 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.5 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to execute arbitrary code with s ... oval:org.secpod.oval:def:2592 The host is missing a security update according to APPLE-SA-2011-01-06-1. The update is required to fix multiple vulnerabilities. The flaws are present in PackageKit, which fail to handle distribution scripts. Successful exploitation could allow an attacker to execute arbitrary code or crash the ser ... oval:org.secpod.oval:def:2593 The host is installed with Apple Mac OS X 10.6 through 10.6.5 and is prone to a format string vulnerability. A flaw is present in the application, which fails to prevent man in the middle attack. Successful exploitation could allow an attacker to execute arbitrary code or crash the service. oval:org.secpod.oval:def:2590 The host is installed with Apple Mac OS X before 10.6.7 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle a Microsoft Office document with a crafted size field. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:62187 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.3 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to cause unexpected system termination ... oval:org.secpod.oval:def:38498 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle input validation. Successful exploitation could allow local user to cause system denial of servic ... oval:org.secpod.oval:def:62186 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.3 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to cause unexpected system termination ... oval:org.secpod.oval:def:38499 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle access restrictions. Successful exploitation could allow local attacker to modify downloaded mobil ... oval:org.secpod.oval:def:62185 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.3 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to cause unexpected system termination ... oval:org.secpod.oval:def:62184 The host is installed with Apple Mac OS X 10.15.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a checks issue. Successful exploitation allows an attacker to use arbitrary entitlements. oval:org.secpod.oval:def:62183 The host is installed with Apple Mac OS X 10.15.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows an attacker to execute arbitrary code with system privileges. oval:org.secpod.oval:def:62182 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. Successful exploitation allows an attacker to execute arbitrary code with ke ... oval:org.secpod.oval:def:38490 The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to execute ar ... oval:org.secpod.oval:def:38491 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle apache_mod_php. Successful exploitation could allow attackers to cause an unexpected application ... oval:org.secpod.oval:def:38520 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to curl. Successful exploitation could allow attackers to leak sensitive u ... oval:org.secpod.oval:def:38521 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to curl. Successful exploitation could allow attackers to leak sensitive u ... oval:org.secpod.oval:def:38522 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to curl. Successful exploitation could allow attackers to leak sensitive u ... oval:org.secpod.oval:def:38523 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to curl. Successful exploitation could allow attackers to leak sensitive u ... oval:org.secpod.oval:def:38524 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to curl. Successful exploitation could allow attackers to leak sensitive u ... oval:org.secpod.oval:def:38525 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to curl. Successful exploitation could allow attackers to leak sensitive u ... oval:org.secpod.oval:def:38526 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to gain root privileges. oval:org.secpod.oval:def:38516 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to curl. Successful exploitation could allow attackers to leak sensitive u ... oval:org.secpod.oval:def:38517 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to curl. Successful exploitation could allow attackers to leak sensitive u ... oval:org.secpod.oval:def:38518 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to curl. Successful exploitation could allow attackers to leak sensitive u ... oval:org.secpod.oval:def:38519 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to curl. Successful exploitation could allow attackers to leak sensitive u ... oval:org.secpod.oval:def:38510 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to curl. Successful exploitation could allow attackers to leak sensitive u ... oval:org.secpod.oval:def:38511 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to curl. Successful exploitation could allow attackers to leak sensitive u ... oval:org.secpod.oval:def:38512 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to curl. Successful exploitation could allow attackers to leak sensitive u ... oval:org.secpod.oval:def:38513 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to curl. Successful exploitation could allow attackers to leak sensitive u ... oval:org.secpod.oval:def:38514 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to curl. Successful exploitation could allow attackers to leak sensitive u ... oval:org.secpod.oval:def:38515 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to curl. Successful exploitation could allow attackers to leak sensitive u ... oval:org.secpod.oval:def:38505 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle malicious strings. Successful exploitation could allow attackers to lead to an unexpected applic ... oval:org.secpod.oval:def:38506 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted font. Successful exploitation could allow attackers to lead to unexpected applicatio ... oval:org.secpod.oval:def:38507 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted .mp4. Successful exploitation could allow attackers to execute arbitrary cod ... oval:org.secpod.oval:def:38508 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle input validation. Successful exploitation could allow attackers to cause system denial of service. oval:org.secpod.oval:def:38509 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted font file. Successful exploitation could allow attackers to lead to arbitrar ... oval:org.secpod.oval:def:38500 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted file. Successful exploitation could allow attackers to execute arbitrary cod ... oval:org.secpod.oval:def:38501 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted file. Successful exploitation could allow attackers to execute arbitrary cod ... oval:org.secpod.oval:def:38502 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle input validations. Successful exploitation could allow attackers to cause denial of service. oval:org.secpod.oval:def:38503 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle memory handling. Successful exploitation could allow attackers to execute arbitrary code with sy ... oval:org.secpod.oval:def:38504 The host is installed with Apple Mac OS X or Server 10.11.6 or 10.12.x through 10.12.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle state management. Successful exploitation could allow attackers to cause system denial of ser ... oval:org.secpod.oval:def:62198 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows an attacker to read restricted memory. oval:org.secpod.oval:def:62197 The host is installed with Apple Mac OS X 10.13.6 or 10.14.6 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows an attacker to gain elevated privileges. oval:org.secpod.oval:def:62196 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory initialization issue. Successful exploitation allows an attacker to execute arbitrary code wi ... oval:org.secpod.oval:def:62194 The host is installed with Apple Mac OS X 10.15.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an icon caches issue. Successful exploitation allows an attacker to identify what other applications a user has installed. oval:org.secpod.oval:def:62193 The host is installed with Apple Mac OS X 10.15.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. Successful exploitation allows an attacker to view sensitive user information. oval:org.secpod.oval:def:62192 The host is installed with Apple Mac OS X 10.15.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a permission issue. Successful exploitation allows an attacker to elevate privileges through an application. oval:org.secpod.oval:def:62191 The host is installed with Apple Mac OS X 10.15.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an existing entitlement issue. Successful exploitation allows an attacker to access a user's call history. oval:org.secpod.oval:def:62190 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to execute arbitrary code with kernel pr ... oval:org.secpod.oval:def:57600 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.5 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to cause an unexpected application ter ... oval:org.secpod.oval:def:62189 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to execute arbitrary code with kernel pr ... oval:org.secpod.oval:def:62188 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to execute arbitrary code with kernel pr ... oval:org.secpod.oval:def:62199 The host is installed with Apple Mac OS X 10.15.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. Successful exploitation allows an attacker to execute arbitrary code with kernel privileges. oval:org.secpod.oval:def:30643 The host is missing a security update according to Apple advisory, APPLE-SA-2015-10-21-7. The update is required to fix an unspecified vulnerability. A flaw is present in the application, which mishandles type conversion. Successful exploitation allows attackers to cause unspecified impact. oval:org.secpod.oval:def:2274 Apple Mac OS X is installed oval:org.secpod.oval:def:49286 The host is installed with Apple Mac OS X 10.14.1 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows an attacker to elevate privileges through a malicious application. oval:org.secpod.oval:def:49287 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to read restricted memory. oval:org.secpod.oval:def:49285 The host is installed with Apple Mac OS X through 10.12.6, 10.13.6 or 10.14.1 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues. Successful exploitation allows attackers to execute arbitrary code or read restricted memo ... oval:org.secpod.oval:def:49288 The host is installed with Apple Mac OS X 10.14.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to execute arbitrary code with system privileges. oval:org.secpod.oval:def:49289 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to execute arbitrary code with k ... oval:org.secpod.oval:def:49290 The host is installed with Apple Mac OS X 10.14.1 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to cause unexpected system termination or read kernel memo ... oval:org.secpod.oval:def:49297 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to execute arbitrary code with s ... oval:org.secpod.oval:def:49298 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to execute arbitrary code with s ... oval:org.secpod.oval:def:49295 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allows an attacker to elevate privileges through a malicious applica ... oval:org.secpod.oval:def:49296 The host is installed with Apple Mac OS X 10.14.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to execute arbitrary code with kernel privileges. oval:org.secpod.oval:def:49293 The host is installed with Apple Mac OS X 10.13.6 or 10.14.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a memory initialization issue. Successful exploitation allows an attacker to read kernel memory. oval:org.secpod.oval:def:49294 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to execute arbitrary code with k ... oval:org.secpod.oval:def:49291 The host is installed with Apple Mac OS X 10.12.6 or 10.13.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to execute arbitrary code with kernel pri ... oval:org.secpod.oval:def:49292 The host is installed with Apple Mac OS X 10.14.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a vulnerable code issue. Successful exploitation allows an attacker to perform a denial of service attack. oval:org.secpod.oval:def:38560 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to gain root privileges. oval:org.secpod.oval:def:26587 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which does not properly invoke initdb to specify the authentication requirements for a database cluster to be used ... oval:org.secpod.oval:def:26589 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a specially crafted timestamp formatting template. Successful exploitation allows attackers to ca ... oval:org.secpod.oval:def:26588 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle certain error messages. Successful exploitation allows attackers to obtain the results of a ... oval:org.secpod.oval:def:26581 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4, 10.11.x before 10.11.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted XML document. Successful exploitation allows a ... oval:org.secpod.oval:def:26580 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle unknown vector. Successful exploitation allows attackers to cause a denial of service. oval:org.secpod.oval:def:38554 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers may gain access to privileged appli ... oval:org.secpod.oval:def:38556 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to gain root privileges. oval:org.secpod.oval:def:38557 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to exploit weaknesses in the 3DES cryptographi ... oval:org.secpod.oval:def:38558 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to cause a denial of service. oval:org.secpod.oval:def:38559 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow certificates may be unexpectedly evaluated as trusted. oval:org.secpod.oval:def:38550 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code in the ... oval:org.secpod.oval:def:38551 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to cause a denial of service. oval:org.secpod.oval:def:26574 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font file. Successful exploitation allows attackers to execute arbitrary cod ... oval:org.secpod.oval:def:26576 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font file. Successful exploitation allows attackers to execute arbitrary cod ... oval:org.secpod.oval:def:26575 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font file. Successful exploitation allows attackers to execute arbitrary cod ... oval:org.secpod.oval:def:26578 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle an AF_INET6 socket. Successful exploitation allows attackers to execute arbitrary code ... oval:org.secpod.oval:def:26577 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font file. Successful exploitation allows attackers to execute arbitrary cod ... oval:org.secpod.oval:def:26579 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle unknown vector. Successful exploitation allows attackers to cause a denial of service. oval:org.secpod.oval:def:38549 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code with ke ... oval:org.secpod.oval:def:38541 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to determine kernel memory layout. oval:org.secpod.oval:def:38542 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code with ke ... oval:org.secpod.oval:def:38543 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code with ke ... oval:org.secpod.oval:def:38544 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to read kernel memory. oval:org.secpod.oval:def:38545 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to cause system denial of service. oval:org.secpod.oval:def:38546 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to cause an unexpected system ter ... oval:org.secpod.oval:def:38547 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to gain root privileges. oval:org.secpod.oval:def:38548 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code with ke ... oval:org.secpod.oval:def:38540 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to read kernel memory. oval:org.secpod.oval:def:62207 The host is installed with Apple Mac OS X 10.15.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle a issue in vim. Successful exploitation allows an attacker to produce unspecified impact. oval:org.secpod.oval:def:38538 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code with ke ... oval:org.secpod.oval:def:62206 The host is installed with Apple Mac OS X 10.15.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allows an attacker to read arbitrary files. oval:org.secpod.oval:def:38539 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to determine kernel memory layout. oval:org.secpod.oval:def:62205 The host is installed with Apple Mac OS X 10.14.6 or 10.15.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allows an attacker to bypass code signing enforcement. oval:org.secpod.oval:def:62203 The host is installed with Apple Mac OS X 10.13.6 or 10.15.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle an injection issue. Successful exploitation allows an attacker to cause arbitrary javascript code execution. oval:org.secpod.oval:def:62202 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a size validation issue. Successful exploitation allows an attacker to produce multiple impacts including buffer ... oval:org.secpod.oval:def:62201 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a bounds check issue. Successful exploitation allows an attacker to produce multiple impacts including buffer ov ... oval:org.secpod.oval:def:62200 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a bounds check issue. Successful exploitation allows an attacker to produce multiple impacts including buffer ov ... oval:org.secpod.oval:def:38530 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted .gcx. Successful exploitation could allow attackers to lead to unexpected ap ... oval:org.secpod.oval:def:38531 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted .gcx. Successful exploitation could allow attackers to lead to unexpected ap ... oval:org.secpod.oval:def:38532 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitr ... oval:org.secpod.oval:def:38533 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to lead to memory leak. oval:org.secpod.oval:def:38534 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to lead to execute arbitrary code ... oval:org.secpod.oval:def:38535 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to lead to determine kernel memory layout. oval:org.secpod.oval:def:38536 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to read kernel memory. oval:org.secpod.oval:def:38537 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code with ke ... oval:org.secpod.oval:def:38527 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code with ke ... oval:org.secpod.oval:def:38528 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted font file. Successful exploitation could allow attackers to execute arbitrar ... oval:org.secpod.oval:def:38529 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted font file. Successful exploitation could allow attackers to execute arbitrar ... oval:org.secpod.oval:def:26596 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code or cause a d ... oval:org.secpod.oval:def:26595 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code or cause a d ... oval:org.secpod.oval:def:26598 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code or cause a d ... oval:org.secpod.oval:def:26597 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code or cause a d ... oval:org.secpod.oval:def:26599 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code or cause a d ... oval:org.secpod.oval:def:26590 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a specially crafted string. Successful exploitation allows attackers to crash or potentially, lea ... oval:org.secpod.oval:def:26592 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a sql injection vulnerability. A flaw is present in the application, which fails to handle certain errors that were generated during protocol synchronization. Successful exploitation allows ... oval:org.secpod.oval:def:26591 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a stack-buffer overflow vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to cause PostgreSQL to crash or, ... oval:org.secpod.oval:def:26594 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted QuickTime file. Successful exploitation allows attackers to execute arbitrary code or ... oval:org.secpod.oval:def:26593 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a maliciously crafted Office document. Successful exploitation allows attackers to execute arbi ... oval:org.secpod.oval:def:26615 The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.4 and is prone to a denial vulnerability. A flaw is present in the application, which fails to handle a crafted tar archive. Successful exploitation allows attackers to cause a denial of service (heap metadata corrup ... oval:org.secpod.oval:def:26619 The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.4 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle a long reply to a LIST command. Successful exploitation allows attackers to execute arbitrary code. oval:org.secpod.oval:def:26618 The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which does not verify that the first character of a filename is different from the \0 character. Successful exploitation allo ... oval:org.secpod.oval:def:26620 The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.4 and is prone to an algorithmic complexity vulnerability. A flaw is present in the application, which fails to handle crafted form data that triggers an improper order-of-growth outcome. Successful exploitation allo ... oval:org.secpod.oval:def:26624 The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which does not verify that the uri property is a string. Successful exploitation allows attackers to obtain sensitive i ... oval:org.secpod.oval:def:26623 The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.4 and is prone to an arbitrary code vulnerability. A flaw is present in the application, which does not verify that __default_headers is an array. Successful exploitation allows attackers to execute arbitrary code by ... oval:org.secpod.oval:def:26604 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code or cause a d ... oval:org.secpod.oval:def:26603 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code or cause a d ... oval:org.secpod.oval:def:26606 The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle an empty HTTP Content-Type header. Successful exploitation allows attackers to cause a denial of servic ... oval:org.secpod.oval:def:26605 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code or caus ... oval:org.secpod.oval:def:26607 The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle long response headers. Successful exploitation allows attackers to cause a denial of service (buffer ov ... oval:org.secpod.oval:def:26609 The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted WebSocket Ping frame. Successful exploitation allows attackers to cause a denial of service ( ... oval:org.secpod.oval:def:26610 The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which does not initialize the protocol structure member. Successful exploitation allows attackers to cause a denial of servic ... oval:org.secpod.oval:def:26612 The host is installed with Xcode before 7.0 on Apple Mac OS X 10.10.4 or later, Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not consider that a Require directive may be associated with an ... oval:org.secpod.oval:def:26600 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code or cause a d ... oval:org.secpod.oval:def:26602 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code or cause a d ... oval:org.secpod.oval:def:26601 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code or cause a d ... oval:org.secpod.oval:def:26659 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows local users to gain privileges or cause a denial of service ( ... oval:org.secpod.oval:def:26658 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an arbitrary code execute vulnerability. A flaw is present in the application, which fails to handle a crafted app that leverages incorrect privilege dropping associated with a locking error. Successful explo ... oval:org.secpod.oval:def:26662 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service (m ... oval:org.secpod.oval:def:26661 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows local users to gain privileges or cause a d ... oval:org.secpod.oval:def:26664 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to local users to gain privileges. oval:org.secpod.oval:def:26663 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service (m ... oval:org.secpod.oval:def:26666 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted app that makes unspecified IOKit API calls. Successful exploitation allows attackers to execute arbitra ... oval:org.secpod.oval:def:26665 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation allows attackers to obtain sensitive memory-layout information. oval:org.secpod.oval:def:26668 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted volume. Successful exploitation allows local users to cause a denial of service. oval:org.secpod.oval:def:26667 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows local users to cause a denial of service (resource consumptio ... oval:org.secpod.oval:def:26660 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows local users to gain privileges or cause a denial of service ( ... oval:org.secpod.oval:def:26648 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a time spoofing vulnerability. A flaw is present in the application, which does not properly restrict access to the Date and Time preferences pane. Successful exploitation allows local users to spoof the time ... oval:org.secpod.oval:def:26647 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted series of Unicode characters. Successful exploitation allows remote proxy servers to execute arbitrary ... oval:org.secpod.oval:def:26649 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which does not use HTTPS. Successful exploitation allows man-in-the-middle attackers to obtain sensitive information by sniffing ... oval:org.secpod.oval:def:26651 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which does not properly validate pathnames in the environment. Successful exploitation allows local users to gain privileges. oval:org.secpod.oval:def:26650 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed DMG image. Successful exploitation allows local users to gain privileges or cause a denial of service ... oval:org.secpod.oval:def:26653 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an arbitrary files overwrite vulnerability. A flaw is present in the application, which fails to handle a crafted document. Successful exploitation allows remote attackers to create, overwrite, rename, or del ... oval:org.secpod.oval:def:26655 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which does not properly initialize an unspecified data structure. Successful exploitation allows remote attackers to obtain sensi ... oval:org.secpod.oval:def:26654 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted TIFF image. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial ... oval:org.secpod.oval:def:26657 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an arbitrary code execute vulnerability. A flaw is present in the application, which does not properly drop privileges. Successful exploitation allows remote attackers to execute arbitrary code in a privilege ... oval:org.secpod.oval:def:26656 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which does not properly initialize an unspecified data structure. Successful exploitation allows remote attackers to obtain sensi ... oval:org.secpod.oval:def:26637 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not properly handle IP addresses in cookie domain names. Successful exploitation allows attackers to set cookies for or send a ... oval:org.secpod.oval:def:26636 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted font file. Successful exploitation allows attackers to execute arbitrary code or cause a denial of serv ... oval:org.secpod.oval:def:26639 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which does not properly copy HTTP POST data for an easy handle, which triggers an out-of-bounds read. Successful exploitation all ... oval:org.secpod.oval:def:26638 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to bypass the Same Origin Policy and set cookies for arbi ... oval:org.secpod.oval:def:26640 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a CRLF injection vulnerability. A flaw is present in the application, which fails to handle CRLF sequences in a URL. Successful exploitation allows remote attackers to inject arbitrary HTTP headers and conduc ... oval:org.secpod.oval:def:26642 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not properly re-use NTLM connections. Successful exploitation allows remote attackers to connect as other users. oval:org.secpod.oval:def:26641 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a server spoofing vulnerability. A flaw is present in the application, which does not check if a cached TLS session validated the certificate when reusing the session. Successful exploitation allows man-in-th ... oval:org.secpod.oval:def:26644 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which does not properly calculate an index. Successful exploitation allows remote attackers to cause a denial of service (out-of-bounds ... oval:org.secpod.oval:def:26643 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which does not properly calculate an index. Successful exploitation allows remote attackers to cause a denial of service (out-of-bounds ... oval:org.secpod.oval:def:26646 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which sends custom HTTP headers to both the proxy and destination server. Successful exploitation allows remote proxy servers to ... oval:org.secpod.oval:def:26645 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not properly re-use authenticated Negotiate connections. Successful exploitation allows remote attackers to connect as other u ... oval:org.secpod.oval:def:26626 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an arbitrary user password change vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to change arbitrary user passwords. oval:org.secpod.oval:def:26628 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a kernel memory-layout information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation allows attackers to obtain sensitive kernel memo ... oval:org.secpod.oval:def:26627 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a kernel memory-layout information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation allows attackers to obtain sensitive kernel memo ... oval:org.secpod.oval:def:26629 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which does not properly restrict Notification Center Service access. Successful exploitation allows attackers to read Notificatio ... oval:org.secpod.oval:def:26631 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to multiple buffer overflows vulnerabilities. The flaws are present in the application, which fails to handle XPC messages. Successful exploitation allows attackers to gain privileges. oval:org.secpod.oval:def:26630 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle malformed Bluetooth ACL packets. Successful exploitation allows attackers to cause a denial of service. oval:org.secpod.oval:def:26633 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation allows attackers to access an iCloud user record associated with a p ... oval:org.secpod.oval:def:26632 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to obtain potentially sensitive information about ... oval:org.secpod.oval:def:26635 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted movie file. Successful exploitation allows attackers to execute arbitrary code or cause a denial of ser ... oval:org.secpod.oval:def:26634 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted movie file. Successful exploitation allows attackers to execute arbitrary code or cause a denial of ser ... oval:org.secpod.oval:def:26695 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted Unicode string. Successful exploitation allows remote attackers to execute arbitrary code or cause a de ... oval:org.secpod.oval:def:26694 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial ... oval:org.secpod.oval:def:26691 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to handle a previously visited web site that is rendered during a Quick Look search. Successful exploitation allow ... oval:org.secpod.oval:def:26690 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an arbitrary file read vulnerability. A flaw is present in the application, which fails to handle an XML document containing an external entity declaration in conjunction with an entity reference. Successful ... oval:org.secpod.oval:def:26693 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which does not properly implement authentication. Successful exploitation allows local users to obtain admin privileges. oval:org.secpod.oval:def:26692 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted Collada file. Successful exploitation allows remote attackers to execute arbitrary code. oval:org.secpod.oval:def:26684 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an integer underflow vulnerability. A flaw is present in the application, which fails to handle a long digit string associated with an invalid backreference within a regular expression. Successful exploitatio ... oval:org.secpod.oval:def:26686 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a file size value larger than the size of the zip file to the (1) ZipExtFile.read, (2) ZipExtFile.read(n), (3) Zi ... oval:org.secpod.oval:def:26685 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted input to an application that maintains a hash table. Successful exploitation allows context-dependent a ... oval:org.secpod.oval:def:26688 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a large size and offset in a "buffer" function. Successful exploitation allows context-dependent attackers ... oval:org.secpod.oval:def:26687 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted string. Successful exploitation allows remote attackers to execute arbitrary code. oval:org.secpod.oval:def:26689 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a SSL servers spoofing vulnerability. A flaw is present in the application, when accessing an HTTPS URL, do not (a) check the certificate against a trust store or verify that the server hostname matches a dom ... oval:org.secpod.oval:def:26682 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows local users to gain privileges or cause a denial of service ( ... oval:org.secpod.oval:def:26681 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which does not properly remove dismissed notifications. Successful exploitation allows attackers to read arbitrary notifications. oval:org.secpod.oval:def:26669 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a crafted executable file. Successful exploitation allows local users to bypass a code-signing protection mechanism ... oval:org.secpod.oval:def:26673 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a malformed plist. Successful exploitation allows attackers to execute arbitrary code in a privileged context or ... oval:org.secpod.oval:def:26672 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a crafted Mach-O file. Successful exploitation allows local users to bypass a code-signing protection mechanism. oval:org.secpod.oval:def:26675 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted regular expression. Successful exploitation allows context-dependent attackers to execute arbitrary cod ... oval:org.secpod.oval:def:26674 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which does not properly validate pathnames in the environment. Successful exploitation allows local users to gain privileges. oval:org.secpod.oval:def:26677 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted regular expression. Successful exploitation allows context-dependent attackers to execute arbitrary cod ... oval:org.secpod.oval:def:26676 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted regular expression. Successful exploitation allows context-dependent attackers to execute arbitrary cod ... oval:org.secpod.oval:def:26679 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted app that sends a malformed XPC message. Successful exploitation allows attackers to execute arbitrary c ... oval:org.secpod.oval:def:26678 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle an app that uses a crafted syscall to interfere with locking. Successful exploitation allows attackers to execute ... oval:org.secpod.oval:def:26671 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a crafted Mach-O file. Successful exploitation allows local users to bypass a code-signing protection mechanism. oval:org.secpod.oval:def:26670 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a crafted multi-architecture executable file. Successful exploitation allows local users to bypass a code-signing p ... oval:org.secpod.oval:def:26703 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted Ad hoc On-Demand Distance Vector (AODV) packet. Successful exploitation allows remote attackers t ... oval:org.secpod.oval:def:26702 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an integer underflow vulnerability. A flaw is present in the application, which fails to handle a crafted length value in an OLSR frame. Successful exploitation allows remote attackers to cause a denial of se ... oval:org.secpod.oval:def:26705 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an arbitrary file read vulnerability. A flaw is present in the application, which fails to handle a text file containing an XML external entity declaration in conjunction with an entity reference. Successful ... oval:org.secpod.oval:def:26704 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted PPP packet. Successful exploitation allows remote attackers to cause a denial of service (crash). oval:org.secpod.oval:def:26706 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a malformed DMG image. Successful exploitation allows local users to gain privileges or cause a denial of service ... oval:org.secpod.oval:def:26701 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not perform any checks of the TZ environment variable value. Successful exploitation allows local user with privileges to exec ... oval:org.secpod.oval:def:2028 The host is installed with Apple QuickTime before 7.7, Apple Mac OS X 10.6 through 10.6.6 or 10.7.0 before 10.7.2 and is prone to cross-origin bypass vulnerability. A flaw is present in the application which fails to properly handle cross-site redirects. Successful exploitation allows remote attacke ... oval:org.secpod.oval:def:2017 The host is installed with Apple QuickTime before 7.7 or Apple Mac OS X 10.6.8 and is prone to heap based overflow vulnerability. A flaw is present in the application which fails to properly handle STSS atoms in a QuickTime movie file. Successful exploitation allows remote attackers to execute arbit ... oval:org.secpod.oval:def:2016 The host is installed with Apple QuickTime before 7.7 or Mac OS X 10.6.8 and is prone to heap based overflow vulnerability. A flaw is present in the application which fails to properly handle STSZ atoms in a QuickTime movie file. Successful exploitation allows remote attackers to execute arbitrary c ... oval:org.secpod.oval:def:2018 The host is installed with Apple QuickTime before 7.7 or Apple Mac OS X 10.6.8 and is prone to heap based overflow vulnerability. A flaw is present in the application which fails to properly handle STSC atoms in a QuickTime movie file. Successful exploitation allows remote attackers to execute arbit ... oval:org.secpod.oval:def:38794 The host is installed with Apple Mac OS X or Server 10.12.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to execute arbitrary code with kernel privilege ... oval:org.secpod.oval:def:38795 The host is installed with Apple Mac OS X or Server 10.12.2 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly perform URL validation. Successful exploitation could allow attackers to execute arbitrary code with kernel privileges. oval:org.secpod.oval:def:38796 The host is installed with Apple Mac OS X or Server 10.12.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly perform memory management. Successful exploitation could allow attackers to determine kernel memory layout. oval:org.secpod.oval:def:38797 The host is installed with Apple Mac OS X or Server 10.12.2 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly perform memory handling. Successful exploitation could allow attackers to execute arbitrary code with kernel privileges. oval:org.secpod.oval:def:38798 The host is installed with Apple Mac OS X or Server 10.12.2 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly perform memory management. Successful exploitation could allow attackers to execute arbitrary code with kernel privileges. oval:org.secpod.oval:def:38799 The host is installed with Apple Mac OS X or Server 10.12.2 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly perform memory management. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:38791 The host is installed with Apple Mac OS X or Server 10.12.2 and is prone to a stack overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted imagefilltoborder call that triggers use of a negative color value. Successful exploitation could allow attackers ... oval:org.secpod.oval:def:38792 The host is installed with Apple Mac OS X or Server 10.12.2 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle a crafted serialized data in a wddxPacket XML document. Successful exploitation could allow attackers to crash th ... oval:org.secpod.oval:def:38793 The host is installed with Apple Mac OS X or Server 10.12.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation could allow attackers to execute arbitrary code with kernel privileges. oval:org.secpod.oval:def:50300 The host is installed with Apple Mac OS X 10.14.2 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to execute arbitrary code through a maliciously ... oval:org.secpod.oval:def:54611 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an input sanitization issue. Successful exploitation allows an attacker to read restricted memory. oval:org.secpod.oval:def:54612 The host is installed with Apple Mac OS X 10.14.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to execute arbitrary code with system privileges. oval:org.secpod.oval:def:54615 The host is installed with Apple Mac OS X 10.14.4 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to perform arbitrary code execution while processing a mal ... oval:org.secpod.oval:def:54616 The host is installed with Apple Mac OS X 10.14.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a checks issue. Successful exploitation allows an attacker to bypass Gatekeeper checks. oval:org.secpod.oval:def:54613 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.4 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allows an attacker to execute arbitrary code with kernel privil ... oval:org.secpod.oval:def:54614 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to perform arbitrary code execut ... oval:org.secpod.oval:def:54619 The host is installed with Apple Mac OS X 10.14.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows an attacker to execute arbitrary code with system privileges. oval:org.secpod.oval:def:54617 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.4 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle a bounds checking issue. Successful exploitation allows an attacker to read restricted memory through a mali ... oval:org.secpod.oval:def:54630 The host is installed with Apple Mac OS X 10.14.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to elevate privileges through a malicious application. oval:org.secpod.oval:def:54622 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.4 and is prone to a remote memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a symlinks validation issue. Successful exploitation allows an attacker to load unsigned kernel extensi ... oval:org.secpod.oval:def:54620 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.4 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory initialization issue. Successful exploitation allows an attacker to execute arbitrary code wi ... oval:org.secpod.oval:def:54621 The host is installed with Apple Mac OS X 10.12.6 or 10.13.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows an attacker to execute arbitrary code with system privileges. oval:org.secpod.oval:def:54626 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows an attacker to execute arbitrary code with system privi ... oval:org.secpod.oval:def:54627 The host is installed with Apple Mac OS X 10.14.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to gain elevated privileges through an application. oval:org.secpod.oval:def:54624 The host is installed with Apple Mac OS X 10.14.4 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle a bounds checking issue. Successful exploitation allows an attacker to cause unexpected system termination or read kernel memory ... oval:org.secpod.oval:def:54625 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.4 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows an attacker to execute arbitrary code with kernel privileg ... oval:org.secpod.oval:def:54628 The host is installed with Apple Mac OS X 10.14.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to perform arbitrary code execution. oval:org.secpod.oval:def:54629 The host is installed with Apple Mac OS X 10.14.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to read restricted memory. oval:org.secpod.oval:def:54633 The host is installed with Apple Mac OS X 10.12.6 or 10.13.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows an attacker to execute arbitrary code with system privileges. oval:org.secpod.oval:def:54631 The host is installed with Apple Mac OS X 10.14.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle the symlinks validation issue. Successful exploitation allows an attacker to modify protected parts of the file system. oval:org.secpod.oval:def:54632 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows an attacker to execute arbitrary code with system privi ... oval:org.secpod.oval:def:54618 The host is installed with Apple Mac OS X 10.14.4 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle an authentication issue. Successful exploitation allows an attacker to log in to another user's account. oval:org.secpod.oval:def:46323 The host is installed with Apple Mac OS X 10.13.5 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation causes a malicious application to execute arbitrary code with kernel pr ... oval:org.secpod.oval:def:46322 The host is installed with Apple Mac OS X 10.13.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle the vulnerable code. Successful exploitation causes a malicious application to determine kernel memory layout. oval:org.secpod.oval:def:46324 The host is installed with Apple Mac OS X 10.13.5 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation causes a malicious application to gain root privileges. oval:org.secpod.oval:def:46332 The host is installed with Apple Mac OS X 10.12.6 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle permission issues in which execute permission is incorrectly granted. On successful exploitation, a local user may be able t ... oval:org.secpod.oval:def:46331 The host is installed with Apple Mac OS X 10.11.6, 10.12.6 or 10.13.5 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle memory corruption issue. On successful exploitation, an application may be able to gain elevated privileges ... oval:org.secpod.oval:def:34642 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ... oval:org.secpod.oval:def:34643 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary cod ... oval:org.secpod.oval:def:34640 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary cod ... oval:org.secpod.oval:def:34641 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to cause a denial of ser ... oval:org.secpod.oval:def:34639 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ke ... oval:org.secpod.oval:def:34637 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ... oval:org.secpod.oval:def:34638 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to cause denial of servi ... oval:org.secpod.oval:def:34635 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ... oval:org.secpod.oval:def:34636 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a security key encryption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to cause unspecified impa ... oval:org.secpod.oval:def:34633 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary co ... oval:org.secpod.oval:def:34634 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to read kernel memory. oval:org.secpod.oval:def:34631 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ... oval:org.secpod.oval:def:34632 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary co ... oval:org.secpod.oval:def:34630 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary cod ... oval:org.secpod.oval:def:34628 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to leak sensitive user in ... oval:org.secpod.oval:def:34629 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to leak sensitive user in ... oval:org.secpod.oval:def:34626 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ... oval:org.secpod.oval:def:34627 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.5 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to e ... oval:org.secpod.oval:def:34624 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary co ... oval:org.secpod.oval:def:34625 The host is installed with Apple Mac OS X or Server 10.10.5 or 10.11.x before 10.11.5 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to cause a de ... oval:org.secpod.oval:def:34622 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ... oval:org.secpod.oval:def:34623 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an out of bounds vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to determine kernel memory layout. oval:org.secpod.oval:def:34620 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary cod ... oval:org.secpod.oval:def:34621 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary cod ... oval:org.secpod.oval:def:17029 The host is installed with Apple Mac OS X 10.8.0 through 10.8.5 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle a crafted Microsoft Office document. Successful exploitation allows attackers to execute arbitrary code or cause a denial o ... oval:org.secpod.oval:def:17020 The host is installed with Apple Mac OS X 10.9 or 10.9.1 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to ensure ACL integrity after the viewing of file ACL information. Successful exploitation allows attackers to bypass intended access restrictions ... oval:org.secpod.oval:def:17024 The host is installed with Apple Mac OS X or Server 10.7.5, 10.8.5, 10.9 or 10.9.1 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to restrict the writes to some trusted memory on the graphics card. Successful exploitation allows attackers to ex ... oval:org.secpod.oval:def:17023 The host is installed with Apple Mac OS X or Server 10.7.5, 10.8.5, 10.9 or 10.9.1 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to restrict the writes to some trusted memory on the graphics card. Successful exploitation allows attackers to ex ... oval:org.secpod.oval:def:17022 The host is installed with Apple Mac OS X or Server 10.7.5, 10.8.5, 10.9 or 10.9.1 and is prone to spoofing vulnerability. A flaw is present in the application, which fails to handle properly restrict Unicode characters in filenames. Successful exploitation allows attackers to spoof file extensions ... oval:org.secpod.oval:def:17021 The host is installed with Apple Mac OS X or Server 10.7.5 or 10.8.5 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle crafted application. Successful exploitation allows attackers to execute arbitrary commands. oval:org.secpod.oval:def:17036 The host is installed with Apple Mac OS X or Server 10.7.5, 10.8.5, 10.9 or 10.9.1 and is prone to integer signedness error vulnerability. A flaw is present in the application, which fails to handle a crafted stsz atom in a movie file. Successful exploitation allows attackers to execute arbitrary co ... oval:org.secpod.oval:def:17031 The host is installed with Apple Mac OS X or Server 10.7.5, 10.8.5, 10.9 or 10.9.1 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted ftab atom in a movie file. Successful exploitation allows attackers to execute arbitrary code or cau ... oval:org.secpod.oval:def:17030 The host is installed with Apple Mac OS X 10.8.5, 10.9 or 10.9.1 and is prone to double free vulnerability. A flaw is present in the application, which fails to handle a crafted Microsoft Word file. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service. oval:org.secpod.oval:def:17035 The host is installed with Apple Mac OS X or Server 10.7.5, 10.8.5, 10.9 or 10.9.1 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to properly perform a byte-swapping operation. Successful exploitation allows attackers to execute arbitrary code ... oval:org.secpod.oval:def:17034 The host is installed with Apple Mac OS X or Server 10.7.5, 10.8.5, 10.9 or 10.9.1 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted PSD image. Successful exploitation allows attackers to execute arbitrary code or cause a denial of s ... oval:org.secpod.oval:def:17033 The host is installed with Apple Mac OS X or Server 10.7.5, 10.8.5, 10.9 or 10.9.1 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted ldat atom in a movie file. Successful exploitation allows attackers to execute arbitrary code or cau ... oval:org.secpod.oval:def:17032 The host is installed with Apple Mac OS X or Server 10.7.5, 10.8.5, 10.9 or 10.9.1 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted ftab atom in a movie file. Successful exploitation allows attackers to execute arbitrary code or cau ... oval:org.secpod.oval:def:17009 The host is installed with Apple Mac OS X 10.8 through 10.8.5 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to handle a crafted app that uses the LaunchServices interface to specify process arguments. Successful exploitation allows attackers to bypa ... oval:org.secpod.oval:def:17007 The host is installed with Apple Mac OS X 10.8.0 before 10.9.2 and is prone to remote code execution vulnerability. A flaw is present in the mod_dav.c in the Apache HTTP Server, which fails to handle a crafted Type 1 font that is embedded in a document. Successful exploitation allows attackers to ex ... oval:org.secpod.oval:def:17016 The host is installed with Apple Mac OS X 10.9 before 10.9.2 and is prone to spoofing vulnerability. A flaw is present in the application, which fails to verify X.509 certificates from HTTPS servers that are accessed using a numerical IP address. Successful exploitation allows man-in-the-middle atta ... oval:org.secpod.oval:def:17015 The host is installed with Apple Mac OS X 10.9 before 10.9.2 and is prone to integer signedness error vulnerability. A flaw is present in the application, which fails to handle crafted Unicode font. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service. oval:org.secpod.oval:def:17014 The host is installed with Apple Mac OS X 10.8 before 10.9.2 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle crafted image. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service. oval:org.secpod.oval:def:17019 The host is installed with Apple Mac OS X or Server 10.7.5, OSX 10.8.5, 10.9 or 10.9.1 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted filename. Successful exploitation allows attackers to execute arbitrary code or cause a denial o ... oval:org.secpod.oval:def:17018 The host is installed with Apple Mac OS X or Server 10.7.5, 10.8.5, 10.9 or 10.9.1 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly handle user privileges. Successful exploitation allows attackers to bypass intended access restrictions by c ... oval:org.secpod.oval:def:17013 The host is installed with Apple Mac OS X 10.8 through 10.8.5 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to remove session cookies upon a Safari reset action. Successful exploitation allows physically proximate attackers to bypass intended access ... oval:org.secpod.oval:def:17012 The host is installed with Apple Mac OS X or Server 10.7.5, OSX 10.8.5, 10.9 or 10.9.1 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle crafted Mach messages. Successful exploitation allows attackers to bypass the App Sandbox protection mecha ... oval:org.secpod.oval:def:17011 The host is installed with Apple Mac OS X 10.9 or 10.9.1 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly validate calls to the free function. Successful exploitation allows attackers to bypass the App Sandbox protection mechanism via craft ... oval:org.secpod.oval:def:17010 The host is installed with Apple Mac OS X 10.9 before 10.9.2 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to handle crafted Mach messages. Successful exploitation allows attackers to bypass the App Sandbox protection mechanism. oval:org.secpod.oval:def:60007 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a bounds check issue. Successful exploitation allows an attacker to submit arbitrary print jobs. oval:org.secpod.oval:def:3954 The host is installed with Apple Mac OS X 10.6.8 or 10.7.2 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to AWT . Successful exploitation could allow attackers to affect confidentiality, integrity, and availability. oval:org.secpod.oval:def:2367 The host is installed with Opera before 11.51 or Apple Mac OS X 10.6.8 or 10.7x before 10.7.3 and is prone to unspecified vulnerability. A flaw is present in the application which is caused due to some unspecified error. Successful exploitation allows attackers to cause unknown impacts. oval:org.secpod.oval:def:39656 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly consider the effects of realloc on buffer contents. Successful exploitation could allow local users to obtain sensitive p ... oval:org.secpod.oval:def:39654 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow local users to gain privileges. oval:org.secpod.oval:def:39655 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly consider the effects of realloc on buffer contents. Successful exploitation could allow local users to obtain sensitive p ... oval:org.secpod.oval:def:38552 The host is installed with Apple Mac OS X or Server 10.11.6 or 10.12.x through 10.12.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to cause a denial of service. oval:org.secpod.oval:def:26585 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a NewSessionTicket during an attempt to reuse a ticket that had been obtained earlier. Successf ... oval:org.secpod.oval:def:26582 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field ... oval:org.secpod.oval:def:3112 The host is installed with Apple Mac OS X 10.7 before 10.7.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted update request. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:74158 The host is installed with Apple Mac OS 11.5, Mac OS X 10.14.6 or 10.15.7 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle input validation issue. On successful exploitation, processing a maliciously crafted font file may lead to ... oval:org.secpod.oval:def:74159 The host is installed with Apple Mac OS 11.5, Mac OS X 10.14.6 or 10.15.7 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle input validation issue. On successful exploitation, an application may be able to execute arbitrary cod ... oval:org.secpod.oval:def:74157 The host is installed with Apple Mac OS 11.5, Mac OS X 10.14.6 or 10.15.7 and is prone to an stack overflow vulnerability. A flaw is present in the application, which fails to properly handle input validation issue. On successful exploitation, processing a maliciously crafted font file may lead to a ... oval:org.secpod.oval:def:74165 The host is installed with Apple Mac OS 11.5 or Mac OS X 10.15.7 and is prone to an logic vulnerability. A flaw is present in the application, which fails to properly handle validation issue. On successful exploitation, playing a malicious audio file may lead to an unexpected application termination ... oval:org.secpod.oval:def:74166 The host is installed with Apple Mac OS 11.5, Mac OS X 10.14.6 or 10.15.7 and is prone to an injection vulnerability. A flaw is present in the application, which fails to properly handle validation issue. On successful exploitation, a malicious application may be able to gain root privileges. oval:org.secpod.oval:def:74164 The host is installed with Apple Mac OS 11.5 or Mac OS X 10.15.7 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle state management issue. On successful exploitation, processing a maliciously crafted audio file may lead to arbitra ... oval:org.secpod.oval:def:74161 The host is installed with Apple Mac OS 11.5 or Mac OS X 10.15.7 and is prone to an logic vulnerability. A flaw is present in the application, which fails to properly handle validation issue. On successful exploitation, a sandboxed process may be able to circumvent sandbox restrictions. oval:org.secpod.oval:def:74160 The host is installed with Apple Mac OS 11.5, Mac OS X 10.14.6 or 10.15.7 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle input validation issue. On successful exploitation, an application may be able to execute arbitrary cod ... oval:org.secpod.oval:def:74154 The host is missing a security update according to Apple advisory, APPLE-SA-2021-07-21-3. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle multiple issues. Successful exploitation allows attackers to cause arbitrary code executio ... oval:org.secpod.oval:def:74152 The host is missing a security update according to Apple advisory, APPLE-SA-2021-07-21-4. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle multiple issues. Successful exploitation allows attackers to cause arbitrary code executio ... oval:org.secpod.oval:def:74178 The host is installed with Apple Mac OS 11.5 or Mac OS X 10.15.7 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle input validation issue. On successful exploitation, processing a maliciously crafted font file may lead to arbitr ... oval:org.secpod.oval:def:74179 The host is installed with Apple Mac OS 11.5, Mac OS X 10.14.6 or 10.15.7 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle issue. On successful exploitation, opening a maliciously crafted file may lead to unexpected applica ... oval:org.secpod.oval:def:74184 The host is installed with Apple Mac OS 11.5, Mac OS X 10.14.6 or 10.15.7 and is prone to an logic vulnerability. A flaw is present in the application, which fails to properly handle validation issue. On successful exploitation, processing a maliciously crafted image may lead to a denial of service. oval:org.secpod.oval:def:74182 The host is installed with Apple Mac OS 11.5, Mac OS X 10.14.6 or 10.15.7 and is prone to an logic vulnerability. A flaw is present in the application, which fails to properly handle state management issue. On successful exploitation, an application may be able to execute arbitrary code with kernel ... oval:org.secpod.oval:def:74169 The host is installed with Apple Mac OS 11.5, Mac OS X 10.14.6 or 10.15.7 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle bounds checking issue. On successful exploitation, a malicious application may be able to gain root pri ... oval:org.secpod.oval:def:74176 The host is installed with Apple Mac OS 11.5, Mac OS X 10.14.6 or 10.15.7 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle checks issue. On successful exploitation, an application may be able to cause unexpected system termina ... oval:org.secpod.oval:def:74177 The host is installed with Apple Mac OS 11.5, Mac OS X 10.14.6 or 10.15.7 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle checks issue. On successful exploitation, processing a maliciously crafted tiff file may lead to a deni ... oval:org.secpod.oval:def:74174 The host is installed with Apple Mac OS 11.5 or Mac OS X 10.15.7 and is prone to an buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle bounds checking issue. On successful exploitation, processing a maliciously crafted image may lead to arbitrary code ... oval:org.secpod.oval:def:74170 The host is installed with Apple Mac OS 11.5, Mac OS X 10.14.6 or 10.15.7 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle checks issue. On successful exploitation, a local attacker may be able to cause unexpected applica ... oval:org.secpod.oval:def:74171 The host is installed with Apple Mac OS 11.5, Mac OS X 10.14.6 or 10.15.7 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle checks issue. On successful exploitation, a malicious application may be able to access restricted file ... oval:org.secpod.oval:def:74189 The host is installed with Apple Mac OS 11.5, Mac OS X 10.14.6 or 10.15.7 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle input validation issue. On successful exploitation, an application may be able to execute arbitrary code w ... oval:org.secpod.oval:def:71491 The host is missing a security update according to Apple advisory, APPLE-SA-2021-04-26-3. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle multiple issues. Successful exploitation allow attackers to execute arbitrary code. oval:org.secpod.oval:def:64599 The host is installed with Apple Mac OS X 10.15.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an issue in environment variables. Successful exploitation allows an attacker to view sensitive user information. oval:org.secpod.oval:def:64603 The host is installed with Apple Mac OS X 10.15.5 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle bounds check issue. Successful exploitation allows an attacker to cause arbitrary code execution through a maliciously crafted ... oval:org.secpod.oval:def:64593 The host is installed with Apple Mac OS X 10.15.5 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle bounds check issue. Successful exploitation allows an attacker to cause arbitrary code execution through a maliciously crafted ... oval:org.secpod.oval:def:64595 The host is installed with Apple Mac OS X 10.15.5 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle bounds check issue. Successful exploitation allows an attacker to cause arbitrary code execution through a maliciously crafted a ... oval:org.secpod.oval:def:64596 The host is installed with Apple Mac OS X 10.15.5 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle bounds check issue. Successful exploitation allows an attacker to cause arbitrary code execution through a maliciously crafted a ... oval:org.secpod.oval:def:64597 The host is installed with Apple Mac OS X 10.15.5 and is prone to a pointer authentication codes vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to make clang generate machine code that does not correc ... oval:org.secpod.oval:def:64592 The host is installed with Apple Mac OS X 10.15.5 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle bounds check issue. Successful exploitation allows an attacker to cause arbitrary code execution through a maliciously crafted ... oval:org.secpod.oval:def:64594 The host is installed with Apple Mac OS X 10.15.5 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle bounds check issue. Successful exploitation allows an attacker to cause arbitrary code execution through a maliciously crafted a ... oval:org.secpod.oval:def:64606 The host is installed with Apple Mac OS X 10.15.5 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an issue in iMessage tapbacks. Successful exploitation allows an attacker to make a user that is removed from an iMessage group ... oval:org.secpod.oval:def:64607 The host is installed with Apple Mac OS X 10.15.5 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows an attacker to cause an unexpected application termination or arbitrary code ... oval:org.secpod.oval:def:64600 The host is installed with Apple Mac OS X 10.15.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle an issue in code. Successful exploitation allows an attacker to break out of the sandbox through a malicious application. oval:org.secpod.oval:def:53561 The host is installed with Apple Mac OS X 10.14.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. On successful exploitation, an attacker may be able to read kernel memory. oval:org.secpod.oval:def:53560 The host is installed with Apple Mac OS X 10.12.6 or 10.14.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a memory initialization issue. Successful exploitation allows an attacker to determine kernel memory layout throu ... oval:org.secpod.oval:def:53563 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an out-of-bounds read issue. Successful exploitation allows an attacker to determine the kernel memory l ... oval:org.secpod.oval:def:53562 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an out-of-bounds read issue. Successful exploitation allows an attacker to determine the kernel memory l ... oval:org.secpod.oval:def:53554 The host is installed with Apple Mac OS X 10.14.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. On successful exploitation, an attacker may be able to cause unexpected system termination or rea ... oval:org.secpod.oval:def:53553 The host is installed with Apple Mac OS X 10.14.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a lock issue. On successful exploitation, an attacker may be able to use a Mac that may not have locked after disconnecting from an ... oval:org.secpod.oval:def:53556 The host is installed with Apple Mac OS X 10.13.6 or 10.14.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to execute arbitrary code with kernel pri ... oval:org.secpod.oval:def:53555 The host is installed with Apple Mac OS X 10.13.6 or 10.14.3 and is prone to a data access vulnerability. A flaw is present in the application, which fails to properly handle a memory initialization issue. Successful exploitation allows an attacker to read kernel memory. oval:org.secpod.oval:def:53558 The host is installed with Apple Mac OS X 10.12.6 or 10.14.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a buffer overflow issue. Successful exploitation allows an attacker to cause arbitrary code execution with syst ... oval:org.secpod.oval:def:53557 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.3 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle a size validation issue. Successful exploitation allows an attacker to cause unexpected system termination ... oval:org.secpod.oval:def:53559 The host is installed with Apple Mac OS X 10.14.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. On successful exploitation, an attacker may be able to gain elevated privileges through an application. oval:org.secpod.oval:def:53570 The host is installed with Apple Mac OS X 10.14.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple input validations in MIG generated code. On successful exploitation, an attacker may be able to execute arbitrary ... oval:org.secpod.oval:def:53572 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.3 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to properly handle an issue in memory management. Successful exploitation allows an attacker to gain elevated privileges. oval:org.secpod.oval:def:53571 The host is installed with Apple Mac OS X 10.14.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. On successful exploitation, an attacker may be able to cause unexpected system termination by p ... oval:org.secpod.oval:def:53574 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle inconsistent checks. Successful exploitation allows an attacker to execute arbitrary shell commands. oval:org.secpod.oval:def:53573 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an out-of-bounds read issue. Successful exploitation allows an attacker to read restricted memory throug ... oval:org.secpod.oval:def:53565 The host is installed with Apple Mac OS X 10.14.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an access issue. On successful exploitation, an attacker may be able to view a user's locked notes. oval:org.secpod.oval:def:53564 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allows an attacker to gain elevated privileges through a malicious a ... oval:org.secpod.oval:def:53566 The host is installed with Apple Mac OS X 10.14.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an access issue. On successful exploitation, an attacker may be able to view sensitive user information. oval:org.secpod.oval:def:53576 The host is installed with Apple Mac OS X 10.12.6 or 10.14.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle inconsistent checks. Successful exploitation allows an attacker to overwrite arbitrary files through a maliciou ... oval:org.secpod.oval:def:53575 The host is installed with Apple Mac OS X 10.14.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle an API issue in dictation requests. On successful exploitation, an attacker may be able to initiate a Dictation request without user ... oval:org.secpod.oval:def:53577 The host is installed with Apple Mac OS X 10.14.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an out-of-bounds read issue. On successful exploitation, an attacker may be able to initiate disclosure of process memory by ... oval:org.secpod.oval:def:53541 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to execute arbitrary code with kernel priv ... oval:org.secpod.oval:def:53550 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.3 and is prone to a data access vulnerability. A flaw is present in the application, which fails to properly handle inconsistent checks. Successful exploitation allows an attacker to overwrite arbitrary files through a malicious app ... oval:org.secpod.oval:def:53552 The host is installed with Apple Mac OS X 10.14.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle inconsistent bounds checking. On successful exploitation, an attacker may be able to read restricted memory through an appli ... oval:org.secpod.oval:def:53543 The host is installed with Apple Mac OS X 10.14.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to cause a denial of service through a maliciously crafted string. oval:org.secpod.oval:def:53542 The host is installed with Apple Mac OS X 10.14.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a file metadata. Successful exploitation allows an attacker to bypass Gatekeeper checks through a malicious application. oval:org.secpod.oval:def:53545 The host is installed with Apple Mac OS X 10.14.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a buffer overflow issue. Successful exploitation allows an attacker to cause elevation of privileges through a malicious application ... oval:org.secpod.oval:def:53544 The host is installed with Apple Mac OS X 10.14.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a buffer overflow issue. Successful exploitation allows an attacker to cause elevation of privileges through a malicious application ... oval:org.secpod.oval:def:53547 The host is installed with Apple Mac OS X 10.14.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a logic issue in the pausing of a FaceTime video. As a result, a user's video may not be paused in a FaceTime call if they e ... oval:org.secpod.oval:def:53546 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allows an attacker to unmount and remount an encrypted volume in another ... oval:org.secpod.oval:def:53549 The host is installed with Apple Mac OS X 10.14.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a memory initialization issue. On successful exploitation, an attacker may be able to gain root privileges through a malicious ... oval:org.secpod.oval:def:53548 The host is installed with Apple Mac OS X 10.14.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a race condition. On successful exploitation, an attacker may be able to gain root privileges through a malicious application. oval:org.secpod.oval:def:26680 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an arbitrary shell command execution vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to execute arbitrary shell commands. oval:org.secpod.oval:def:37357 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected application termination or arbitrary code execut ... oval:org.secpod.oval:def:34650 The host is installed with Apple Mac OS X 10.11.x before 10.11.5 or 10.12.x through 10.12.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arb ... oval:org.secpod.oval:def:38555 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:26586 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle vectors that trigger a NULL value of a BIO data structure. Successful exploitation allows attac ... oval:org.secpod.oval:def:26608 The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which does not support an httpd configuration. Successful exploitation allows attackers to bypass intended access restr ... oval:org.secpod.oval:def:15484 The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to arbitrary file disclosure vulnerability. The flaw is present in the the SOAP parser in PHP before 5.3.22 and 5.4.x before 5.4.12, which fails ... oval:org.secpod.oval:def:14170 The host is installed with Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to processes certain queries by converting hash keys to symbols. Successful exploitation could allow an attack ... oval:org.secpod.oval:def:14171 The host is installed with Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which does not properly handle \n (newline) characters. Successful exploitation could allow an attacker to execute arbitra ... oval:org.secpod.oval:def:60013 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in OpenLDAP. Successful exploitation allows an attacker to encounter multiple issues ... oval:org.secpod.oval:def:3155 The host is installed with Apple Mac OS X 10.6.8 and is prone to multiple cross-site scripting (XSS) vulnerabilities. The flaw are present in the application, which fails to properly encode characters in html output. Successful exploitation could allow attackers to inject arbitrary code. oval:org.secpod.oval:def:3125 The host is installed with Apache Tomcat in Apple Mac OS X and is prone to multiple cross-site scripting (XSS) vulnerabilities. The flaws are present in the application which fails to properly filter HTML code from user-supplied input before displaying the input. Successful exploitation allows remot ... oval:org.secpod.oval:def:3151 The host is installed with Apple Mac OS X 10.7 before 10.7.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle Type 1 fonts. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:2876 The host is installed with Apple Mac OS X 10.6 through 10.6.7 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, that fails to handle client data that triggers a buffer overflow. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:2862 The host is installed with Apple Mac OS X 10.5.8 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, as it fails to handle Window's Security ID's. Successful exploitation could allow attackers to execute arbitrary code or crash the service. oval:org.secpod.oval:def:4287 The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to multiple integer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted TIFF file. Successful exploitation could allow attackers to trigger a heap-based buffer overflow. oval:org.secpod.oval:def:4320 The host is installed with Apple Mac OS 10.5.8 or 10.6.0 before 10.6.4 and is prone to multiple integer overflow vulnerabilities. The flaws are present in the application, which fails to handle a crafted TIFF file. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3547 The host is installed with Apple Mac OS X 10.5.8 or 10.6.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to affect confidentiality, integrity, and availability. oval:org.secpod.oval:def:3546 The host is installed with Apple Mac OS X 10.5.8 or 10.6.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to affect confidentiality, integrity, and availability. oval:org.secpod.oval:def:3521 The host is installed with Apple Mac OS X 10.5.8 or 10.6.3 and is prone to a heap overflow vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to overflow a buffer. oval:org.secpod.oval:def:64590 The host is missing a security update according to Apple advisory, APPLE-SA-2020-07-15-2. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allow remote attackers to execute arbitrary code or ... oval:org.secpod.oval:def:64604 The host is installed with Apple Mac OS X 10.15.5 or Mac OS 11 before 11.0.1 and is prone to a command injection vulnerability. A flaw is present in the application, which fails to properly handle a routing issue. Successful exploitation allows an attacker in a privileged network position to inject ... oval:org.secpod.oval:def:57594 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.5 and is prone to a stack overflow vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to view sensitive information. oval:org.secpod.oval:def:3147 The host is installed with Apple Mac OS X 10.6.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle certain floating-point value in scientific notation. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:45899 The host is installed with Apple Mac OS X 10.13.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle memory management issue. Successful exploitation allows attackers to execute arbitrary code with system privileges. oval:org.secpod.oval:def:45930 The host is installed with Apple Mac OS X 10.11.6, 10.12.6 or 10.13.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows attackers to execute arbitrary code with system privile ... oval:org.secpod.oval:def:45902 The host is installed with Apple Mac OS X 10.13.4 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to properly handle the memory handling issue. Successful exploitation allows attackers with a malicious application to elevate privileges. oval:org.secpod.oval:def:45903 The host is installed with Apple Mac OS X 10.11.6 or 10.12.6 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an object management issue. Successful exploitation allows attackers to determine kernel memory layout. oval:org.secpod.oval:def:45904 The host is installed with Apple Mac OS X 10.13.4 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle the configuration issue. Successful exploitation allows attackers with root privileges to modify the EFI flash memory region. oval:org.secpod.oval:def:45900 The host is installed with Apple Mac OS X 10.13.4 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle input validation issue. Successful exploitation allows attackers to read kernel memory. oval:org.secpod.oval:def:45909 The host is installed with Apple Mac OS X 10.13.4 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows attackers to spoof password prompts in iBooks. oval:org.secpod.oval:def:45905 The host is installed with Apple Mac OS X 10.11.6, 10.12.6 or 10.13.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows attackers to perform arbitrary code execution. oval:org.secpod.oval:def:45906 The host is installed with Apple Mac OS X 10.13.4 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle the entitlement plists issue. Successful exploitation allows attackers to circumvent sandbox restrictions. oval:org.secpod.oval:def:45907 The host is installed with Apple Mac OS X 10.11.6, 10.12.6 or 10.13.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an input sanitization issue. Successful exploitation allows attackers to read restricted memory. oval:org.secpod.oval:def:45912 The host is installed with Apple Mac OS X 10.13.4 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows attackers to execute arbitrary code with kernel privileges. oval:org.secpod.oval:def:45913 The host is installed with Apple Mac OS X 10.13.4 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows attackers to execute arbitrary code with kernel privileges. oval:org.secpod.oval:def:45914 The host is installed with Apple Mac OS X 10.11.6, 10.12.6 or 10.13.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows attackers to perform a denial of service attack. oval:org.secpod.oval:def:45910 The host is installed with Apple Mac OS X 10.13.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an input sanitization issue. Successful exploitation allows attackers to read restricted memory. oval:org.secpod.oval:def:45911 The host is installed with Apple Mac OS X 10.13.4 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a locking issue. Successful exploitation allows attackers to execute arbitrary code with kernel privileges. oval:org.secpod.oval:def:45916 The host is installed with Apple Mac OS X 10.13.4 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a bounds checking issue. Successful exploitation allows attackers to execute arbitrary code with kernel privileges. oval:org.secpod.oval:def:45917 The host is installed with Apple Mac OS X 10.13.4 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a bounds checking issue. Successful exploitation allows attackers to execute arbitrary code with kernel privileges. oval:org.secpod.oval:def:45918 The host is installed with Apple Mac OS X 10.13.4 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows attackers to gain elevated privileges. oval:org.secpod.oval:def:45919 The host is installed with Apple Mac OS X 10.13.4 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle an encrypted mail issue. Successful exploitation allows attackers to exfiltrate the contents of S/MIME-encrypted e-mail. oval:org.secpod.oval:def:45923 The host is installed with Apple Mac OS X 10.13.4 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. Successful exploitation allows attackers to read a persistent account identifier. oval:org.secpod.oval:def:45924 The host is installed with Apple Mac OS X 10.13.4 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle the S-MIME certificaties issue. Successful exploitation allows attackers to track users by malicious websites using client certificates ... oval:org.secpod.oval:def:45925 The host is installed with Apple Mac OS X 10.13.4 and is prone to a security authorization vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. Successful exploitation allows attackers to read a persistent device identifier. oval:org.secpod.oval:def:45926 The host is installed with Apple Mac OS X 10.13.4 and is prone to a security authorization vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. Successful exploitation allows attackers to read a persistent device identifier. oval:org.secpod.oval:def:45920 The host is installed with Apple Mac OS X 10.13.4 and is prone to a messages injection vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows attackers to conduct impersonation attacks. oval:org.secpod.oval:def:45921 The host is installed with Apple Mac OS X 10.13.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a message validation issue. Successful exploitation allows attackers to lead to denial of service. oval:org.secpod.oval:def:45922 The host is installed with Apple Mac OS X 10.13.4 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a locking issue. Successful exploitation allows attackers to execute arbitrary code with kernel privileges. oval:org.secpod.oval:def:45927 The host is installed with Apple Mac OS X 10.13.4 and is prone to a security authorization vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. Successful exploitation allows attackers to read a persistent device identifier. oval:org.secpod.oval:def:45928 The host is installed with Apple Mac OS X 10.13.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a microphone access issue. Successful exploitation allows attackers to circumvent sandbox restrictions. oval:org.secpod.oval:def:45929 The host is installed with Apple Mac OS X 10.13.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a text validation issue. Successful exploitation allows attackers to lead to a denial of service. oval:org.secpod.oval:def:25277 This settings determines whether to audit the event of a user who attempts to access an object that has a specified system access control list (SACL), effectively enabling auditing to take place. It is targeted to File and Folders object access processes. oval:org.secpod.oval:def:75666 The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 11 before 11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. Successful exploitation allows an attacker to cause an unexpected ... oval:org.secpod.oval:def:39653 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to properly handle a forwarded agent-socket. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:3848 The host is installed with Apple Mac OS X before 10.6.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a string argument that represents a large number. Successful exploitation could allow remote attackers to crash the service. oval:org.secpod.oval:def:74172 The host is installed with Apple Mac OS 11.5, Mac OS X 10.14.6 or 10.15.7 and is prone to an access vulnerability. A flaw is present in the application, which fails to properly handle access restrictions issue. On successful exploitation, a sandboxed process may be able to circumvent sandbox restric ... oval:org.secpod.oval:def:74194 The host is installed with Apple Mac OS 11 before 11.4 or Mac OS X 10.14.6 or 10.15.7 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle improper memory management. On successful exploitation, processing a maliciously crafted fon ... oval:org.secpod.oval:def:74195 The host is installed with Apple Mac OS 11 before 11.4 or Mac OS X 10.15.7 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle improper memory management. On successful exploitation, an unprivileged application may be able to cap ... oval:org.secpod.oval:def:74192 The host is installed with Apple Mac OS X 10.14.6 or 10.15.7 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle improper environment sanitization. On successful exploitation, a malicious application may be able to break out of its sa ... oval:org.secpod.oval:def:74193 The host is installed with Apple Mac OS 11 before 11.4 or Mac OS X 10.14.6 or 10.15.7 and is prone to a double free vulnerability. A flaw is present in the application, which fails to properly handle improper memory management. On successful exploitation, a malicious application may be able to execu ... oval:org.secpod.oval:def:74191 The host is installed with Apple Mac OS 11 before 11.4 or Mac OS X 10.14.6 or 10.15.7 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle issue. On successful exploitation, a malicious application may be able to gain root privileges ... oval:org.secpod.oval:def:4300 The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to multiple cross-site scripting (XSS) vulnerabilities. The flaws are present in the application, which fails to handle vectors involving (1) certain encrypted strings in e-mail headers, related to contrib/decrypt_he ... oval:org.secpod.oval:def:3841 The host is installed with Apple Mac OS X 10.5.8 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle session data. Successful exploitation could allow attackers to inject arbitrary code. oval:org.secpod.oval:def:75662 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. Successful exploitation allows an attack ... oval:org.secpod.oval:def:75661 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows an attacker ... oval:org.secpod.oval:def:77517 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.3 or Apple Mac OS 12 before 12.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a permissions validation issue. On successful exploitation, appli ... oval:org.secpod.oval:def:77516 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.3 or Apple Mac OS 12 before 12.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. On successful exploitation, processi ... oval:org.secpod.oval:def:77514 The host is missing a security update according to Apple advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle multiple issues. On successful exploitation, allow attackers to execute arbitrary code, cause denial of service o ... oval:org.secpod.oval:def:77520 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.3 or Apple Mac OS 12 before 12.2 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. On successful exploitation, malicious applicat ... oval:org.secpod.oval:def:59000 The host is installed with Apple MacOS X 10.13.6, 10.14.6 and before 10.13 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation could allow attackers to execute arbitrary code with kern ... oval:org.secpod.oval:def:59005 The host is installed with Apple MacOS X before 10.15 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation could allow attackers to execute arbitrary code with system privileges. oval:org.secpod.oval:def:59006 The host is installed with Apple MacOS X before 10.15 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation could allow attackers to to determine kernel memory layout. oval:org.secpod.oval:def:59007 The host is installed with Apple MacOS X 10.13.6, 10.14.6 and before 10.13 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation could allow attackers to execute arbitrary code with kern ... oval:org.secpod.oval:def:59008 The host is installed with Apple MacOS X before 10.15 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation could allow attackers to execute arbitrary code with kernel privileges. oval:org.secpod.oval:def:59003 The host is installed with Apple MacOS X 10.13.6, 10.14.6 and before 10.13 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation could allow attackers to disclose the process memory. oval:org.secpod.oval:def:59004 The host is installed with Apple MacOS X before 10.15 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a state related issue. Successful exploitation could allow attackers to encounter a race condition when reading and writing us ... oval:org.secpod.oval:def:59010 The host is installed with Apple MacOS X 10.13.6, 10.14.6 and before 10.13 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle the links in encrypted PDFs. Successful exploitation could allow attackers to exfiltrate the conten ... oval:org.secpod.oval:def:59011 The host is installed with Apple MacOS X before 10.15 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a permissions logic issue. Successful exploitation could allow attackers to access recent documents. oval:org.secpod.oval:def:59012 The host is installed with Apple MacOS X before 10.15 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation could allow attackers to execute arbitrary code with system privileges. oval:org.secpod.oval:def:59013 The host is installed with Apple MacOS X 10.13.6, 10.14.6 and before 10.13 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a bounds checking issue. Successful exploitation could allow attackers to lead to arbitrary code execution. oval:org.secpod.oval:def:59009 The host is installed with Apple MacOS X before 10.15 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a data related issue. Successful exploitation could allow attackers to view a users locked notes. oval:org.secpod.oval:def:59478 The host is missing a critical security update according to Apple advisory, APPLE-SA-2019-10-07-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows remote attackers to execute arbitrar ... oval:org.secpod.oval:def:59479 The host is installed with Apple Mac OS X 10.13.6 or 10.14.6 and before 10.13 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted audio file. Successful exploitation may lead to arbitrary code execution ... oval:org.secpod.oval:def:59477 The host is missing a critical security update according to Apple advisory, APPLE-SA-2019-10-29-10. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows remote attackers to execute arbitra ... oval:org.secpod.oval:def:59481 The host is installed with Apple MacOS X before 10.15 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted web content. Successful exploitation may lead to a cross site scripting attack. oval:org.secpod.oval:def:59482 The host is installed with Apple MacOS X before 10.15 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a large input. Successful exploitation may lead to a denial of service. oval:org.secpod.oval:def:59483 The host is installed with Apple MacOS X 10.13.6, 10.14.6 and before 10.13 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:59484 The host is installed with Apple Mac OS X 10.13.6 or 10.14.6 and before 10.13 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly validate an input. Successful exploitation allows an attacker to leak sensitive user information. oval:org.secpod.oval:def:59480 The host is installed with Apple MacOS X before 10.15 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted iBooks file. Successful exploitation could allow attackers to cause a persistent denial-of-service. oval:org.secpod.oval:def:59489 The host is installed with Apple Mac OS X 10.13.6 or 10.14.6 and before 10.13 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a malicious shader. Successful exploitation may result in unexpected application termination or arbitr ... oval:org.secpod.oval:def:59485 The host is installed with Apple Mac OS X 10.13.6 or 10.14.6 and before 10.13 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly validate a maliciously crafted string. Successful exploitation may lead to heap corruption. oval:org.secpod.oval:def:59486 The host is installed with Apple Mac OS X 10.13.6 or 10.14.6 and before 10.13 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly validate an input. Successful exploitation allows an attacker to perform a denial of service attack. oval:org.secpod.oval:def:59487 The host is installed with Apple Mac OS X 10.13.6 or 10.14.6 and before 10.13 and is prone to an elevation of privileges vulnerability. A flaw is present in the application, which fails to properly validate a malicious application. Successful exploitation allows an attacker to elevate privileges. oval:org.secpod.oval:def:59488 The host is installed with Apple MacOS X 10.13.6, 10.14.6 and before 10.13 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation could allow attackers to cause unexpected application t ... oval:org.secpod.oval:def:59492 The host is installed with Apple MacOS X 10.13.6 or 10.14.6 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation may be able to cause unexpected system termination or read kernel memo ... oval:org.secpod.oval:def:59493 The host is installed with Apple MacOS X before 10.15 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation may be able to read a persistent account identifier. oval:org.secpod.oval:def:59494 The host is installed with Apple MacOS X 10.13.6 or 10.14.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle IPv6 packets. Successful exploitation may be able to determine kernel memory layout. oval:org.secpod.oval:def:59495 The host is installed with Apple MacOS X 10.13.6 or 10.14.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation could allow attackers to cause memory corruption. oval:org.secpod.oval:def:59490 The host is installed with Apple Mac OS X 10.13.6 or 10.14.6 and before 10.13 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a malicious shader. Successful exploitation may result in unexpected application termination or arbitr ... oval:org.secpod.oval:def:59491 The host is installed with Apple Mac OS X 10.13.6 or 10.14.6 and before 10.13 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a malicious shader. Successful exploitation may result in unexpected application termination or arbitr ... oval:org.secpod.oval:def:59496 The host is installed with Apple MacOS X 10.13.6 or 10.14.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation could allow attackers to cause memory corruption. oval:org.secpod.oval:def:59497 The host is installed with Apple MacOS X 10.13.6 or 10.14.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation could allow attackers to cause memory corruption. oval:org.secpod.oval:def:59498 The host is installed with Apple MacOS X before 10.15 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vector. Successful exploitation may be able to passively observe device names in AWDL communications. oval:org.secpod.oval:def:59499 The host is installed with Apple MacOS X before 10.15 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:59500 The host is installed with Apple MacOS X 10.13.6 or 10.14.6 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle a unknown vector. Successful exploitation could allow attackers to check for the existence of arbitrary files. oval:org.secpod.oval:def:59501 The host is installed with Apple MacOS X 10.13.6 or 10.14.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation could allow attackers to execute arbitrary code with system privileges. oval:org.secpod.oval:def:59502 The host is installed with Apple MacOS X 10.13.6 or 10.14.6 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted text file. Successful exploitation may lead to disclosure of user information. oval:org.secpod.oval:def:4841 The host is installed with Java for Mac OS X before 10.6 Update 3 and is prone to a arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle Mach RPC messages. Successful exploitation could allow attacker to execute arbitrary code. oval:org.secpod.oval:def:3734 The host is installed with Java for Mac OS X before 10.6 Update 3 and is prone to a arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle Mach RPC messages. Successful exploitation could allow attacker to execute arbitrary code. oval:org.secpod.oval:def:4298 The host is installed with Apple Mac OS X 10.6 before 10.6.4 and is prone to a cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to handle a crafted URI that triggers a UTF-7 error page. Successful exploitation could allow remote attackers to inject arbitrar ... oval:org.secpod.oval:def:3150 The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.2 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted PNG image. Successful exploitation could allow attackers overwrite memory with an arbitrary amount of data. oval:org.secpod.oval:def:3149 The host is installed with Apple Mac OS X 10.6.8 or 10.7 before 10.7.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a function call using a NULL pointer argument instead of an empty-string argument. Successful exploitation could allow ... oval:org.secpod.oval:def:26652 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an arbitrary files overwrite vulnerability. A flaw is present in the application, which fails to handle a symlink attack on a pdf#####.tmp temporary file. Successful exploitation allows local users to overwri ... oval:org.secpod.oval:def:3136 The host is installed with Apple Mac OS X 10.6.8 and is prone to multiple STARTTLS command execution vulnerability. The flaws are present in the application, which fails to clearing the command queue after processing a STARTTLS command. Successful exploitation could allow attackers to obtain sensiti ... oval:org.secpod.oval:def:3120 The host is installed with Apache Tomcat in Apple Mac OS X and is prone to security bypass vulnerability. A flaw is present in SecurityManager, which fails to make ServletContext attribute read-only thus allowing local web applications to read or write files outside the intended working directory. S ... oval:org.secpod.oval:def:3126 The host is installed with Apache Tomcat and is prone to multiple cross site scripting vulnerabilities. Flaws are present in the HTML Manager Interface, which fails to properly validate user supplied input before using it in dynamically generated content. Successful exploitation allows remote attack ... oval:org.secpod.oval:def:3124 The host is installed with Apache Tomcat in Apple Mac OS X 10.6.8 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a request for a resource that requires (1) BASIC or (2) DIGEST authentication. Successful exploitation could allow at ... oval:org.secpod.oval:def:3866 The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to parse 1-bit interlaced images with width values that are not divisible by 8. Successful exploitation could allow attack ... oval:org.secpod.oval:def:3738 The host is installed with Apple Mac OS X 10.6.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle anonymous SSL and TLS connections. Successful exploitation could man-in-the-middle attackers to redirect a connection and obt ... oval:org.secpod.oval:def:3737 The host is installed with Apple Mac OS X 10.5.8 and 10.6.4 and is prone to a stack based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted embedded font in a document. Successful exploitation could allow attackers to execute arbitrary code or crash ... oval:org.secpod.oval:def:3741 The host is installed with Apple Mac OS X 10.5.8 or 10.6.4 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted PDF file. Successful exploitation could attackers to crash the service. oval:org.secpod.oval:def:3742 The host is installed with Apple Mac OS X 10.5.8 or 10.6.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly perform comparisons to domain-name strings in X.509 certificates. Successful exploitation could allow man-in-the-middle attackers ... oval:org.secpod.oval:def:3745 The host is installed with Apple Mac OS X 10.6.4 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to properly handle serialized data. Successful exploitation could allow attackers to obtain sensitive information. oval:org.secpod.oval:def:3743 The host is installed with Apple Mac OS X 10.6.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle directory pathnames that lack a trailing / (slash) character. Successful exploitation could man-in-the-middle attackers to bypass int ... oval:org.secpod.oval:def:2875 The host is installed with Apple Mac OS X 10.6 through 10.6.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed record in a TLS connection. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3851 The host is installed with Apple Mac OS X before 10.6.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an unanticipated oplock break notification reply packet. Successful exploitation could allow remote attackers to crash the s ... oval:org.secpod.oval:def:3747 The host is installed with Apple Mac OS X 10.5.8 or 10.6.4 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted field in a packet. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3819 The host is installed with Apple Mac OS X before 10.6.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a file that contains crafted localization data with format string specifiers. Successful exploitation could allow a local ... oval:org.secpod.oval:def:3510 The host is installed with Apple Mac OS X 10.5.8 or 10.6.2 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle vectors that trigger memory corruption. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:3511 The host is installed with Apple Mac OS X 10.5.8 or 10.6.2 and is prone to an integer overflow vulnerability. A flaw is present in the applications, which fail to handle a SWF file with a large exception_count value. Successful exploitation could allow attackers to cause memory corruption. oval:org.secpod.oval:def:3512 The host is installed with Apple Mac OS X 10.5.8 or 10.6.2 and is prone to multiple unspecified vulnerabilities. The flaw are present in the applications, which fail to sanitize user supplied input. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:3513 The host is installed with Apple Mac OS X 10.5.8 or 10.6.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to which fails to sanitize user supplied input. Successful exploitation could allow attackers to obtain the names of local files via u ... oval:org.secpod.oval:def:3509 The host is installed with Apple Mac OS X 10.5.8 or 10.6.2 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle vectors that trigger memory corruption. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:3502 The host is installed with Apple Mac OS X 10.5.8 or 10.6.2 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted MP4 audio file. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3507 The host is installed with Apple Mac OS X 10.5.8 or 10.6.2 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the applications, which fail to handle crafted dimensions of JPEG data in an SWF file. Successful exploitation could allow attackers to overflow the buffer. oval:org.secpod.oval:def:3508 The host is installed with Apple Mac OS X 10.5.8 or 10.6.2 and is prone to an unspecified vulnerability. A flaw is present in the applications, which fail to handle vectors, related to a "data injection vulnerability." Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:3505 The host is installed with Apple Mac OS X 10.5.8 or 10.6.2 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted DNG image. Successful exploitation could allow attackers to overflow the buffer. oval:org.secpod.oval:def:3830 The host is installed with Apple Mac OS X before 10.6.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly validate hostnames of SSH clients. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3828 The host is installed with Apple Mac OS X before 10.6.3 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted disk image with bzip2 compression. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3829 The host is installed with Apple Mac OS X before 10.6.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly perform authorization during processing of record names. Successful exploitation could allow local users to gain privileges. oval:org.secpod.oval:def:3839 The host is installed with Apple Mac OS X and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted document. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3812 The host is installed with Apple Mac OS X before 10.6.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a mount request. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3821 The host is installed with Apple Mac OS X before 10.6.3 and is prone to a directory traversal vulnerability. A flaw is present in the application, which allow attackers to share root's parent directory, and read and modify files in that directory. Successful exploitation could allow attackers to obt ... oval:org.secpod.oval:def:3827 The host is installed with Apple Mac OS X before 10.6.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted disk image with bzip2 compression. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3817 The host is installed with Apple Mac OS X before 10.6.3 and is prone to a man-in-the-middle attack vulnerability. A flaw is present in the application, which fails to properly handle NULL characters in the subject's Common Name (CN) field of X.509 certificates. Successful exploitation could allow at ... oval:org.secpod.oval:def:3818 The host is installed with Apple Mac OS X before 10.6.3 and is prone to a incomplete blacklist vulnerability. A flaw is present in the application, which fails to properly handle a web page that offers a download with a Content-Type value that is not on the list of possibly unsafe content types for ... oval:org.secpod.oval:def:3870 The host is installed with Apple Mac OS X 10.6 before 10.6.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly resolve pathnames in certain circumstances involving an application's save panel. Successful exploitation could allow attac ... oval:org.secpod.oval:def:3877 The host is installed with Apple Mac OS X 10.6 before 10.6.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails properly perform access control checks. Successful exploitation could allow remote authenticated users to bypass intended access restri ... oval:org.secpod.oval:def:3878 The host is installed with Apple Mac OS X 10.5.8 and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to handle strings that are used as input to the sasl_encode64 function in lib/saslutil.c. Successful exploitation could allow attackers to ... oval:org.secpod.oval:def:3876 The host is installed with Apple Mac OS X 10.6 before 10.6.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails ensure that copied files are owned by the user performing the copy. Successful exploitation could allow local users to bypass intended disk- ... oval:org.secpod.oval:def:3880 The host is installed with Apple Mac OS X 10.5.8 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a redirect. Successful exploitation could allow attackers to access local files oval:org.secpod.oval:def:3881 The host is installed with Apple Mac OS X 10.5.8 and is prone to an improper virus update vulnerability. A flaw is present in the application if Security Update 2009-005 is applied, which has an incorrect launchd.plist ProgramArguments key and consequently does not run. Successful exploitation coul ... oval:org.secpod.oval:def:3882 The host is installed with Apple Mac OS X 10.5.8 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a packet data. Successful exploitation could allow attackers to bypass intended access restrictions. oval:org.secpod.oval:def:3770 The host is installed with Apple Quicktime before 7.6.6 or Apple Mac OS X 10.6 before 10.6.2 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to handle crafted audio content with QDMC encoding. Successful exploitation could allow attac ... oval:org.secpod.oval:def:3771 The host is installed with Apple Mac OS X 10.6 before 10.6.3 or Apple Quicktime 7.6.6 and is prone to a buffer overflow vulnerability. A flaw is present in the applications, which fail to handle a malformed .3g2 movie file. Successful exploitation could allow attackers to trigger an incorrect buffer ... oval:org.secpod.oval:def:3769 The host is installed with Apple Mac OS X before 10.6.3 or Quicktime before 7.7.6 and is prone to a denial of service vulnerability. A flaw is present in the applications, which fails to handle crafted audio content with QDM2 encoding. Successful exploitation could allow attackers to crash the servi ... oval:org.secpod.oval:def:4302 The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to a session fixation vulnerability. A flaw is present in the application, which fails to handle a crafted cookie. Successful exploitation could allows remote attackers to hijack web sessions. oval:org.secpod.oval:def:4303 The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle a crafted message. Successful exploitation allows remote attackers to spoof the user interface. oval:org.secpod.oval:def:4301 The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to an arbitrary command execution vulnerability. A flaw is present in the application, which fails to handle shell metacharacters in a username string. Successful exploitation could allows remote attackers to execute ... oval:org.secpod.oval:def:3867 The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.3 and is prone to an arbitrary command execution vulnerability. A flaw is present in the application, which fails to handle a malicious sequence inserted into a file. Successful exploitation could allow attackers allow remote attac ... oval:org.secpod.oval:def:94367 The host is installed with Jenkins LTS 2.60.1 through 2.414.1 or Jenkins rolling release 2.50 through 2.423 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle filtering builds in the build history widget. Successful exploitation allow ... oval:org.secpod.oval:def:94368 The host is installed with Jenkins LTS through 2.414.1 or Jenkins rolling release through 2.423 and is prone to a stored cross-site scripting (xss) vulnerability. A flaw is present in the application, which fails to handle caption constructor parameter of ExpandableDetailsNote. Successful exploitati ... oval:org.secpod.oval:def:94369 The host is installed with Jenkins LTS through 2.414.1 or Jenkins rolling release through 2.423 and is prone to an incorrect default permissions vulnerability. A flaw is present in the application, which fails to handle default permissions for temporary files created in the system temporary directo ... oval:org.secpod.oval:def:94370 The host is installed with Jenkins LTS through 2.414.1 or Jenkins rolling release through 2.423 and is prone to an unrestricted upload of file with dangerous type vulnerability. A flaw is present in the application, which fails to handle default permissions for newly created files. On successful exp ... oval:org.secpod.oval:def:94371 The host is installed with Jenkins LTS through 2.414.1 or Jenkins rolling release through 2.423 and is prone to an unrestricted upload of file with dangerous type vulnerability. A flaw is present in the application, which fails to handle default permissions for newly created files. On successful exp ... oval:org.secpod.oval:def:59014 The host is installed with Apple MacOS X before 10.15 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle the web page elements. Successful exploitation could allow attackers to reveal browsing history. oval:org.secpod.oval:def:59015 The host is installed with Apple MacOS X before 10.15 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the data deletion issue. Successful exploitation could allow attackers to make the user unable to delete browsing history item ... oval:org.secpod.oval:def:15482 The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to an unspecified vulnerability. The flaw is present in the ext/soap/soap.c in PHP before 5.3.22 and 5.4.x before 5.4.13, which does not validat ... oval:org.secpod.oval:def:15479 The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to denial of service vulnerability. The flaw is present in the crypto/evp/e_aes_cbc_hmac_sha1.c in the AES-NI functionality in the TLS 1.1 and 1 ... oval:org.secpod.oval:def:14150 The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.3, Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to information disclosure vulnerability. A flaw is present in the application, which does not pro ... oval:org.secpod.oval:def:2404 The host is installed with Google Chrome before 14.0.835.163 or Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to double free vulnerability. A flaw is present in the application which fails in XPath handling. Successful exploitation allows remote attackers to cause denial of service or p ... oval:org.secpod.oval:def:77515 The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 11 before 11.6.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. On successful exploitation, a malicious application may be able to bypass certa ... oval:org.secpod.oval:def:75675 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an at ... oval:org.secpod.oval:def:75686 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attac ... oval:org.secpod.oval:def:75685 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows an attacker ... oval:org.secpod.oval:def:75684 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. Successful exploitation allows an ... oval:org.secpod.oval:def:75660 The host is missing a security update according to Apple advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle multiple issues. Successful exploitation allow attackers to execute arbitrary code, cause denial of service or di ... oval:org.secpod.oval:def:75679 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows an attacker ... oval:org.secpod.oval:def:75682 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a permissions logic issue. Successful exploitation allows an at ... oval:org.secpod.oval:def:75681 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle bounds check issue. Successful exploitation allows an attacker t ... oval:org.secpod.oval:def:75680 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle bounds check issue. Successful exploitation allows an attacker t ... oval:org.secpod.oval:def:75665 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle a bounds check issue. Successful exploitation allows an attacker ... oval:org.secpod.oval:def:75677 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attac ... oval:org.secpod.oval:def:75674 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle bounds check issue. Successful exploitation allows an attacker ... oval:org.secpod.oval:def:75673 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a state related issue. Successful exploitation allows an a ... oval:org.secpod.oval:def:75672 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an inherited permissions issue. Successful exploitation allows ... oval:org.secpod.oval:def:75670 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows ... oval:org.secpod.oval:def:75669 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to an out-of-bounds vulnerability. A flaw is present in the application, which fails to properly handle a bounds check issue. Successful exploitation allows an attacker to c ... oval:org.secpod.oval:def:75668 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to an out-of-bounds vulnerability. A flaw is present in the application, which fails to properly handle a bounds check issue. Successful exploitation allows an attacker to c ... oval:org.secpod.oval:def:75667 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to an out-of-bounds vulnerability. A flaw is present in the application, which fails to properly handle a bounds check issue. Successful exploitation allows an attacker to c ... oval:org.secpod.oval:def:75664 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle a bounds check issue. Successful exploitation allows an attacker ... oval:org.secpod.oval:def:59993 The host is installed with Apple Mac OS X 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues. oval:org.secpod.oval:def:58798 The host is installed with Xcode before 11.0 on Apple Mac OS X 10.14.4 or later and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple issues in libssh2. Successful exploitation allows an attacker to execute arbitrary ... oval:org.secpod.oval:def:3108 The host is installed with Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle multiple overlapping ranges. Successful exploitation could allow attackers to crash the s ... oval:org.secpod.oval:def:3129 The host is installed with Apache HTTP Server before 2.2.18 and is prone to a stack consumption vulnerability. A flaw is present in the application, which fails to handle *? sequences in the first argument. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3127 The host is installed with Apache Tomcat in Apple Mac OS X and is prone to denial of service vulnerability. A flaw is present in the application which is caused by an error in the NIO connector when processing a request line. Successful exploitation allow remote attackers to cause an OutOfMemory err ... oval:org.secpod.oval:def:3123 The host is installed with Apache Tomcat in Apple Mac OS X and is prone to multiple vulnerabilities.. A flaw is present in the application, which fails to handle an invalid Transfer-Encoding header. Successful exploitation could allow attackers to crash the service or obtain sensitive information. oval:org.secpod.oval:def:3740 The host is installed with Apple Mac OS X 10.5.8 or 10.6.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted CAB archive that uses the Quantum (aka .Q) compression format. Successful exploitation could attackers to crash ... oval:org.secpod.oval:def:3739 The host is installed with Apple Mac OS X 10.5.8 or 10.6.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle the (1) CAB and (2) 7z file formats. Successful exploitation could attackers to bypass virus detection. oval:org.secpod.oval:def:3868 The host is installed with Apple Mac OS X 10.5.8 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly validate package signatures. Successful exploitation could allow attackers allow remote attackers to have unspecified impacts. oval:org.secpod.oval:def:3162 The host is installed with Apple Mac OS X 10.7.0 before 10.7.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to ensure that all disk data is encrypted during the enabling of FileVault. Successful exploitation could allow attackers to obtai ... oval:org.secpod.oval:def:5794 The host is installed with Apple Mac OS X 10.7.x before 10.7.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle vectors involving a temporary files. Successful exploitation could allow attackers to gain privileges. oval:org.secpod.oval:def:5799 The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to properly handle tar archives and iso9660 files. Successful exploitation could allow attackers to execute arbitra ... oval:org.secpod.oval:def:5798 The host is installed with Apple Mac OS X 10.7 before 10.7.4 and is prone to an integer underflow vulnerability. A flaw is present in the application, which fails to properly a crafted catalog file in an HFS disk image. Successful exploitation could allow attackers to execute arbitrary code or cause ... oval:org.secpod.oval:def:5797 The host is installed with Apple Mac OS X 10.6.8 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted message. Successful exploitation could allow an attacker to disclose memory from directory server's address space. oval:org.secpod.oval:def:5796 The host is installed with Apple Mac OS X 10.7.x before 10.7.4 and is prone to a data-injection attack vulnerability. A flaw is present in the application, which fails to properly handle a crafted URL. Successful exploitation may lead to protocol-specific data injection attacks. oval:org.secpod.oval:def:3148 The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle invalid sCAL chunks. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:5810 The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted MPEG file. Successful exploitation could allow attackers to execute arbitrary code or crash the ser ... oval:org.secpod.oval:def:5813 The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to a Symlink attack vulnerability. A flaw is present in the application, which fails to properly handle a symlink attack. Successful exploitation could allow attackers to delete arbitrary files. oval:org.secpod.oval:def:5812 The host is installed with Apple Mac OS X 10.7.0 before 10.7.4 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to properly handle a crafted movie file with JPEG2000 encoding. Successful exploitation could allow attackers to execute arbitrary code or ... oval:org.secpod.oval:def:5811 The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to a buffer underflow vulnerability. A flaw is present in the application, which fails to properly handle crafted MPEG file. Successful exploitation could allow attackers to execute arbitrary code or crash the serv ... oval:org.secpod.oval:def:5818 The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted input. Successful exploitation could allow attackers to execute arbitrary code or crash the servi ... oval:org.secpod.oval:def:5816 The host is installed with Apple Mac OS X 10.6.8 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a Batched (aka AndX) request that triggers infinite recursion. Successful exploitation could allow attackers to execute ar ... oval:org.secpod.oval:def:5815 The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted input to an application that maintains a hash table. Successful exploitation could allow attacker ... oval:org.secpod.oval:def:5809 The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted audio sample tables in a movie file. Successful exploitation could allow attackers to execute arbitra ... oval:org.secpod.oval:def:5808 The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to an improper access control vulnerability. A flaw is present in the application, which fails to properly handle screen savers. Successful exploitation could allow attackers to bypass screen locking and launch a S ... oval:org.secpod.oval:def:5819 The host is installed with Apple Mac OS X 10.7.0 before 10.7.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails does not require continued use of SRP-based authentication after this authentication method is first used. Successful exploitation could a ... oval:org.secpod.oval:def:5803 The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted XML file. Successful exploitation could allow attackers to trigger a heap-based buffer overflow w ... oval:org.secpod.oval:def:5802 The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to a network sniffing attack vulnerability. A flaw is present in the application, which fails to properly restrict the length of RSA keys within X.509 certificates. Successful exploitation could allow attackers to ... oval:org.secpod.oval:def:5801 The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to an uninitialized memory access vulnerability. A flaw is present in the application, which fails to properly handle X.509 certificates. Successful exploitation could allow attackers to execute arbitrary code or c ... oval:org.secpod.oval:def:5800 The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted tar archive. Successful exploitation could allow attackers to execute arbitrary code or crash the s ... oval:org.secpod.oval:def:5804 The host is installed with Apple Mac OS X 10.7.0 before 10.7.4 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly handle an empty password. Successful exploitation allows physically proximate attackers to login to arbitrary accounts. oval:org.secpod.oval:def:3764 The host is installed with Google Chrome before 16.0.912.75, Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to c ... oval:org.secpod.oval:def:2217 The host is installed with Google Chrome before 13.0.782.215, Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to a double free vulnerability. A flaw is present in the application, which fails to handle libxml xpath. Successful exploitation could allow attackers to crash the service or cau ... oval:org.secpod.oval:def:21725 The host is installed with Apple Mac OS X or Server before 10.10.1 or Apple Safari before 6.2.1, 7.x before 7.1.1 or 8.x before 8.0.1 and is prone to use-after-free vulnerability. A flaw is present in the WebKit, which fails to properly handle a crafted page objects in an HTML document. Successful e ... oval:org.secpod.oval:def:2851 The host is installed with Apple Mac OS X 10.6 through 10.6.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle CFString object. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:2850 The host is installed with Mac OS X 10.6 through 10.6.7 or Apple Safari before 5.0.5 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle images with an embedded ColorSync profile. Successful exploitation could allow attackers to execute arbi ... oval:org.secpod.oval:def:2856 The host is installed with Apple Mac OS X and is prone to a buffer overflow vulnerability. A flaw is present in the application, as it fails to handle uppercase strings. Successful exploitation could allow attackers to execute arbitrary code or crash the service. oval:org.secpod.oval:def:2949 The host is installed with Apple Safari version less than or equal to 5.0.5 or Mac OS X 10.6.8 and is prone to heap-based buffer overflow vulnerability. A flaw is present in ImageIO in the application, which fails to handle a crafted TIFF image with CCITT Group 4 encoding. Successful exploitation al ... oval:org.secpod.oval:def:40568 The host is installed with Apple Safari before 10.1.1 and is prone to an address bar spoofing vulnerability. A flaw is present in the application, which fails to properly handle malicious website. Successful exploitation could allow attackers would lead to address bar spoofing. oval:org.secpod.oval:def:40569 The host is installed with Apple Safari before 10.1.1 and is prone to an address bar spoofing vulnerability. A flaw is present in the application, which fails to properly handle malicious website. Successful exploitation could allow attackers would lead to address bar spoofing. oval:org.secpod.oval:def:40567 The host is installed with Apple Safari before 10.1.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted webpage. Successful exploitation could allow attackers would lead to an application denial of service. oval:org.secpod.oval:def:40571 The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to arbitrary code execution ... oval:org.secpod.oval:def:40572 The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to arbitrary code execution ... oval:org.secpod.oval:def:40575 The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to arbitrary code execution ... oval:org.secpod.oval:def:40576 The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to arbitrary code execution ... oval:org.secpod.oval:def:40573 The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to arbitrary code execution ... oval:org.secpod.oval:def:40574 The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to arbitrary code execution ... oval:org.secpod.oval:def:40579 The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to arbitrary code execution ... oval:org.secpod.oval:def:40577 The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to arbitrary code execution ... oval:org.secpod.oval:def:40578 The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to arbitrary code execution ... oval:org.secpod.oval:def:40582 The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to arbitrary code execution ... oval:org.secpod.oval:def:40583 The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to arbitrary code execution ... oval:org.secpod.oval:def:40580 The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to arbitrary code execution ... oval:org.secpod.oval:def:40586 The host is installed with Apple Safari before 10.1.1 and is prone to an universal cross site scripting vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to universal cross si ... oval:org.secpod.oval:def:40587 The host is installed with Apple Safari before 10.1.1 and is prone to an universal cross site scripting vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to universal cross si ... oval:org.secpod.oval:def:40584 The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to arbitrary code execution ... oval:org.secpod.oval:def:40585 The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to arbitrary code execution ... oval:org.secpod.oval:def:40589 The host is installed with Apple Safari before 10.1.1 and is prone to an universal cross site scripting vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to universal cross si ... oval:org.secpod.oval:def:40590 The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to arbitrary code execution ... oval:org.secpod.oval:def:40591 The host is installed with Apple Safari before 10.1.1 and is prone to an universal cross site scripting vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to arbitrary code exe ... oval:org.secpod.oval:def:40592 The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle memory issues. Successful exploitation could allow attackers would lead to arbitrary code execution. oval:org.secpod.oval:def:37826 The host is installed with Apple Safari before 10.0.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle malicious crafted web content. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:37823 The host is missing a security update according to Apple advisory, APPLE-SA-2016-10-24-3. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code o ... oval:org.secpod.oval:def:38392 The host is installed with Apple Safari before 10.0.2 and is prone to an universal cross site scripting vulnerability. A flaw is present in the application, which fails to properly handle safari reader feature. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:38400 The host is installed with Apple Safari before 10.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:38402 The host is installed with Apple Safari before 10.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:38404 The host is installed with Apple Safari before 10.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:38406 The host is installed with Apple Safari before 10.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:38407 The host is installed with Apple Safari before 10.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:38408 The host is installed with Apple Safari before 10.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:41428 The host is installed with Apple Safari before 10.1.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted webpage. Successful exploitation could allow attackers to cause denial of service. oval:org.secpod.oval:def:3345 The host is installed with Apple Safari before 4.0.5 or Apple iTunes before 9.1 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to ensure that memory access is associated with initialized memory. Successful exploitation could allow attackers to cr ... oval:org.secpod.oval:def:3343 The host is installed with Apple Safari before 4.0.5 or Apple iTunes before 9.1 and is prone to an information disclosure vulnerability. A flaw is present in the applications, which fail to ensure that memory access is associated with initialized memory. Successful exploitation could allow attackers ... oval:org.secpod.oval:def:3344 The host is installed with Apple Safari before 4.0.5 or Apple iTunes before 9.1 and is prone to an information disclosure vulnerability. A flaw is present in the applications, which fail to ensure that memory access is associated with initialized memory. Successful exploitation could allow attackers ... oval:org.secpod.oval:def:42137 The host is installed with Apple Safari before 11 and is prone to an address bar spoofing vulnerability. A flaw is present in the application, which fails to properly handle a malicious website. Successful exploitation could allow attackers to lead to address bar spoofing. oval:org.secpod.oval:def:42139 The host is installed with Apple Safari before 11 and is prone to an address bar spoofing vulnerability. A flaw is present in the application, which fails to properly handle a malicious website. Successful exploitation could allow attackers to lead to address bar spoofing. oval:org.secpod.oval:def:44809 The host is installed with Apple Safari before 11.1 and is prone to an address bar spoofing vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to address bar spoofing. oval:org.secpod.oval:def:44808 The host is installed with Apple Safari before 11.1 and is prone to an address bar spoofing vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to address bar spoofing. oval:org.secpod.oval:def:44810 The host is installed with Apple Safari before 11.1 and is prone to an information disclosure vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may be able to exfiltrate autofilled data in Safari without explicit user in ... oval:org.secpod.oval:def:44816 The host is installed with Apple Safari before 11.1 and is prone to a memory corrpution vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:44822 The host is installed with Apple Safari before 11.1 and is prone to a memory corrpution vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:45307 The host is installed with Apple Safari before 11.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications, which fails to properly handle a memory corruption issue. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:45305 The host is missing a security update according to Apple advisory, APPLE-SA-2018-04-24-3. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to disclose sens ... oval:org.secpod.oval:def:44908 The host is installed with Apple Safari before 10.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:44909 The host is installed with Apple Safari before 10.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation may exfiltrate data cross-origin. oval:org.secpod.oval:def:44911 The host is installed with Apple Safari before 10.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation may exfiltrate data cross-origin. oval:org.secpod.oval:def:44912 The host is installed with Apple Safari before 10.1 and is prone to an universal cross site script vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted web page. Successful exploitation may lead to universal cross site scripting. oval:org.secpod.oval:def:44913 The host is installed with Apple Safari before 10.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:44914 The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation may lead to unexpected application termination or arbitrary c ... oval:org.secpod.oval:def:44910 The host is installed with Apple Safari before 10.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation may exfiltrate data cross-origin. oval:org.secpod.oval:def:48588 The host is installed with Apple Safari before 12.0.1 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly handle a data deletion issue in browsing history. Successful exploitation allows attackers to prevent users from deleting browsing ... oval:org.secpod.oval:def:48589 The host is installed with Apple Safari before 12.0.1 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly handle a data deletion issue in browsing history. Successful exploitation allows attackers to prevent users from deleting browsing ... oval:org.secpod.oval:def:48587 The host is missing a security update according to Apple advisory, APPLE-SA-2018-10-30-3. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle a malicious website. Successful exploitation could allow attackers to cause denial of serv ... oval:org.secpod.oval:def:48593 The host is installed with Apple Safari before 12.0.1 and is prone to a memory coruption vulnerability. A flaw is present in the application, which fails to properly handle a data deletion issue in browsing history. Successful exploitation allows attackers to execute arbitrary code. oval:org.secpod.oval:def:48594 The host is installed with Apple Safari before 12.0.1 and is prone to a memory coruption vulnerability. A flaw is present in the application, which fails to properly handle a data deletion issue in browsing history. Successful exploitation allows attackers to execute arbitrary code. oval:org.secpod.oval:def:48591 The host is installed with Apple Safari before 12.0.1 and is prone to a memory coruption vulnerability. A flaw is present in the application, which fails to properly handle a data deletion issue in browsing history. Successful exploitation allows attackers to execute arbitrary code. oval:org.secpod.oval:def:48592 The host is installed with Apple Safari before 12.0.1 and is prone to a memory coruption vulnerability. A flaw is present in the application, which fails to properly handle a data deletion issue in browsing history. Successful exploitation allows attackers to execute arbitrary code. oval:org.secpod.oval:def:48590 The host is installed with Apple Safari before 12.0.1 and is prone to a memory coruption vulnerability. A flaw is present in the application, which fails to properly handle a data deletion issue in browsing history. Successful exploitation allows attackers to execute arbitrary code. oval:org.secpod.oval:def:48599 The host is installed with Apple Safari before 12.0.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a data deletion issue in browsing history. Successful exploitation allows attackers to cause a denial of service. oval:org.secpod.oval:def:48597 The host is installed with Apple Safari before 12.0.1 and is prone to a memory coruption vulnerability. A flaw is present in the application, which fails to properly handle a data deletion issue in browsing history. Successful exploitation allows attackers to execute arbitrary code. oval:org.secpod.oval:def:48598 The host is installed with Apple Safari before 12.0.1 and is prone to a memory coruption vulnerability. A flaw is present in the application, which fails to properly handle a data deletion issue in browsing history. Successful exploitation allows attackers to execute arbitrary code. oval:org.secpod.oval:def:48595 The host is installed with Apple Safari before 12.0.1 and is prone to a memory coruption vulnerability. A flaw is present in the application, which fails to properly handle a data deletion issue in browsing history. Successful exploitation allows attackers to execute arbitrary code. oval:org.secpod.oval:def:48596 The host is installed with Apple Safari before 12.0.1 and is prone to a memory coruption vulnerability. A flaw is present in the application, which fails to properly handle a data deletion issue in browsing history. Successful exploitation allows attackers to execute arbitrary code. oval:org.secpod.oval:def:4319 The host is installed with Apple Mac OS X 10.4.11 or 10.5 before 10.5.8 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted image containing an embedded ColorSync profile. Successful exploitation could allow attackers to o ... oval:org.secpod.oval:def:42604 The host is installed with Apple Safari before 11.0.1 and is prone to an address bar spoofing vulnerability. A flaw is present in the application, which fails to properly handle a malicious website. Successful exploitation could allow attackers to lead to address bar spoofing. oval:org.secpod.oval:def:42603 The host is installed with Apple Safari before 11.0.1 and is prone to an address bar spoofing vulnerability. A flaw is present in the application, which fails to properly handle a malicious website. Successful exploitation could allow attackers to lead to address bar spoofing. oval:org.secpod.oval:def:42607 The host is installed with Apple Safari before 11.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitrary code execution. oval:org.secpod.oval:def:42606 The host is installed with Apple Safari before 11.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitrary code execution. oval:org.secpod.oval:def:42605 The host is installed with Apple Safari before 11.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitrary code execution. oval:org.secpod.oval:def:42611 The host is installed with Apple Safari before 11.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitrary code execution. oval:org.secpod.oval:def:42610 The host is installed with Apple Safari before 11.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitrary code execution. oval:org.secpod.oval:def:42615 The host is installed with Apple Safari before 11.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitrary code execution. oval:org.secpod.oval:def:42614 The host is installed with Apple Safari before 11.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitrary code execution. oval:org.secpod.oval:def:42613 The host is installed with Apple Safari before 11.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitrary code execution. oval:org.secpod.oval:def:42612 The host is installed with Apple Safari before 11.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitrary code execution. oval:org.secpod.oval:def:42616 The host is installed with Apple Safari before 11.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitrary code execution. oval:org.secpod.oval:def:47522 The host is installed with Apple Safari before 12.0 and is prone to a user interface spoofing vulnerability. A flaw is present in the application, which fails to properly handle a data deletion issue in browsing history. Successful exploitation allows attackers to prevent users from deleting browsin ... oval:org.secpod.oval:def:47521 The host is installed with Apple Safari before 12.0 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a malicious website, when loaded by the target user. Successful exploitation allows attackers to obtain potentially sensit ... oval:org.secpod.oval:def:47523 The host is installed with Apple Safari before 12.0 and is prone to a user interface spoofing vulnerability. A flaw is present in the application, which fails to properly handle an inconsistent user interface issue. Successful exploitation allows attackers to spoof user interface content. oval:org.secpod.oval:def:49305 The host is installed with Apple Safari before 12.0.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an issue in data deletion. A user may be unable to fully delete browsing history. oval:org.secpod.oval:def:49306 The host is installed with Apple Safari before 12.0.2 and is prone to an arbitrary code execution vulnerability. The flaws are present in the application, which fails to properly handle multiple memory corruption issues. On successful exploitation, an attacker may be able to cause arbitrary code exe ... oval:org.secpod.oval:def:49303 The host is installed with Apple Safari before 12.0.2 and is prone to an address bar spoofing vulnerability. A flaw is present in the application, which fails to properly handle a logic issue in state management. Successful exploitation allows attackers to cause address bar spoofing. oval:org.secpod.oval:def:49304 The host is installed with Apple Safari before 12.0.2 and is prone to a UI spoofing vulnerability. A flaw is present in the application, which fails to properly handle a logic issue in validation. Successful exploitation allows attackers to cause UI spoofing. oval:org.secpod.oval:def:49309 The host is installed with Apple Safari before 12.0.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle memory corruption issue. On successful exploitation, an attacker may be able to cause arbitrary code execution. oval:org.secpod.oval:def:49307 The host is installed with Apple Safari before 12.0.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory corruption issue. On successful exploitation, an attacker may be able to cause arbitrary code execution. oval:org.secpod.oval:def:49308 The host is installed with Apple Safari before 12.0.2 and is prone to an arbitrary code execution vulnerability. The flaws are present in the application, which fails to properly handle multiple memory corruption issues. On successful exploitation, an attacker may be able to cause arbitrary code exe ... oval:org.secpod.oval:def:49312 The host is missing a security update according to Apple advisory, APPLE-SA-2018-12-05-4. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle a malicious website. Successful exploitation could allow attackers to execute arbitrary co ... oval:org.secpod.oval:def:49310 The host is installed with Apple Safari before 12.0.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle memory corruption issue. On successful exploitation, an attacker may be able to cause arbitrary code execution. oval:org.secpod.oval:def:49311 The host is installed with Apple Safari before 12.0.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle memory corruption issue. On successful exploitation, an attacker may be able to cause arbitrary code execution. oval:org.secpod.oval:def:46305 The host is installed with Apple Safari before 11.1.2 and is prone to an address bar spoofing vulnerability. A flaw is present in the application, which fails to properly handle a malicious website. Successful exploitation allows attackers to perform address bar spoofing on visiting a malicious webs ... oval:org.secpod.oval:def:46319 The host is installed with Apple Safari before 11.1.2 and is prone to an address bar spoofing vulnerability. A flaw is present in the application, which fails to properly handle a malicious website. Successful exploitation allows attackers to spoof address bars. oval:org.secpod.oval:def:46317 The host is installed with Apple Safari before 11.1.2 and is prone to a multiple memory corruption vulnerabilities.The flaws are present in the application, which fails to properly handle a maliciously crafted web content. Successful exploitation allows attackers to cause an unexpected Safari crash. oval:org.secpod.oval:def:46320 The host is installed with Apple Safari before 11.1.2 and is prone to an address bar spoofing vulnerability. A flaw is present in the application, which fails to properly handle a malicious website. Successful exploitation allows attackers to spoof address bars. oval:org.secpod.oval:def:45935 The host is installed with Apple Safari before 11.1.1 and is prone to an arbitrary code executuion vulnerability. A flaw is present in the applications, which fails to properly handle maliciously crafted web content. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:45936 The host is installed with Apple Safari before 11.1.1 and is prone to an address bar spoofing vulnerability. A flaw is present in the applications, which fails to properly handle inconsistent user interface issues. Successful exploitation may lead to address bar spoofing. oval:org.secpod.oval:def:45937 The host is installed with Apple Safari before 11.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications, which fails to properly handle memory issues. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:45931 The host is installed with Apple Safari before 11.1.1 and is prone to a denial-of-service vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to a denial-of-service. oval:org.secpod.oval:def:45932 The host is installed with Apple Safari before 11.1.1 and is prone to an address bar spoofing vulnerability. A flaw is present in the applications, which fails to properly handle an inconsistent user interface. Successful exploitation may lead to a address bar spoofing. oval:org.secpod.oval:def:45941 The host is installed with Apple Safari before 11.1.1 and is prone to an address bar spoofing vulnerability. A flaw is present in the applications, which fails to properly handle inconsistent user interface issues. Successful exploitation may lead to address bar spoofing. oval:org.secpod.oval:def:45944 The host is missing a security update according to Apple advisory, APPLE-SA-2018-06-01-2. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to cause arbitra ... oval:org.secpod.oval:def:58774 The host is installed with Apple Mac OS X 10.14.6 or Safari before 13.0.1 and is prone to a UI spoofing vulnerability. A flaw is present in the application, which fails to properly handle an inconsistent user interface issue. Successful exploitation allows an attacker to cause user interface spoofin ... oval:org.secpod.oval:def:58775 The host is installed with Apple Mac OS X 10.14.6 or 10.13.6 and Safari before 13.0.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle service worker lifetime. Successful exploitation allows an attacker to obtain sensitive ... oval:org.secpod.oval:def:58776 The host is installed with Apple Mac OS X 10.14.6 or 10.13.6 and Safari before 13 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allows an attacker to cause universal cross-site scripti ... oval:org.secpod.oval:def:58773 The host is missing a security update according to Apple advisory, APPLE-SA-2019-9-26-4. The update is required to fix a cross-site scripting vulnerability. A flaw is present in the application, which fails to handle a logic issue. Successful exploitation allows an attacker to cause universal cross- ... oval:org.secpod.oval:def:57596 The host is installed with Apple Mac OS X 10.14.5 or Safari before 12.1.2 and is prone to an address bar spoofing vulnerability. A flaw is present in the application, which fails to properly handle an inconsistent user interface issue. Successful exploitation allows an attacker to cause address bar ... oval:org.secpod.oval:def:63486 The host is installed with Safari before 13.1.1 on Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.5 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allow a remote at ... oval:org.secpod.oval:def:63487 The host is installed with Safari before 13.1.1 on Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allow a remote attacker to ... oval:org.secpod.oval:def:63488 The host is installed with Safari before 13.1.1 on Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.5 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an access issue. Successful exploitation allow an attacker to cause ... oval:org.secpod.oval:def:63478 The host is missing a security update according to Apple advisory, APPLE-SA-2020-05-26-7. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle a malicious web content. Successful exploitation could allow attackers to execute arbitrar ... oval:org.secpod.oval:def:63479 The host is installed with Safari before 13.1.1 on Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.5 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation cause Safari to launch a ... oval:org.secpod.oval:def:63480 The host is installed with Safari before 13.1.1 on Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.5 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation cause Safari to launch a ... oval:org.secpod.oval:def:63481 The host is installed with Safari before 13.1.1 on Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.5 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allow an attacker to cause un ... oval:org.secpod.oval:def:63482 The host is installed with Safari before 13.1.1 on Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.5 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to properly handle a memory issue. Successful exploitation allow an attacker to cause arbitra ... oval:org.secpod.oval:def:63483 The host is installed with Safari before 13.1.1 on Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. Successful exploitation allow an attacker to ... oval:org.secpod.oval:def:63484 The host is installed with Safari before 13.1.1 on Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. Successful exploitation allow an attacker to ... oval:org.secpod.oval:def:63485 The host is installed with Safari before 13.1.1 on Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.5 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allow a remote attacker to c ... oval:org.secpod.oval:def:62176 The host is installed with Safari before 13.1 on Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.4 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to properly handle a memory management issue. Successful exploitation could allow an attacker t ... oval:org.secpod.oval:def:62175 The host is installed with Safari before 13.1 on Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.4 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation could allow aan attacker to read ... oval:org.secpod.oval:def:62174 The host is installed with Safari before 13.1 on Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory issue. Successful exploitation could allow an attacker to execut ... oval:org.secpod.oval:def:62173 The host is installed with Safari before 13.1 on Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory issue. Successful exploitation could allow an attacker to execut ... oval:org.secpod.oval:def:62172 The host is installed with Safari before 13.1 on Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation could lead to a download's orig ... oval:org.secpod.oval:def:62171 The host is installed with Safari before 13.1 on Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.4 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to properly handle a memory issue. Successful exploitation could allow an attacker to execute a ... oval:org.secpod.oval:def:62170 The host is installed with Safari before 13.1 on Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation could allow a malicious iframe ... oval:org.secpod.oval:def:62169 The host is missing a security update according to Apple advisory, APPLE-SA-2020-03-24-5. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle a malicious web content. Successful exploitation could allow attackers to execute arbitrar ... oval:org.secpod.oval:def:62180 The host is installed with Safari before 13.1 on Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation could lead to a file URL being ... oval:org.secpod.oval:def:62179 The host is installed with Safari before 13.1 on Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.4 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation could allow an atta ... oval:org.secpod.oval:def:62178 The host is installed with Safari before 13.1 on Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.4 and is prone to a memory consumption vulnerability. A flaw is present in the application, which fails to properly handle a memory issue. Successful exploitation could allow a remote attacker to ... oval:org.secpod.oval:def:62177 The host is installed with Safari before 13.1 on Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.4 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to properly handle a memory issue. Successful exploitation could allow a remote attacker to exe ... oval:org.secpod.oval:def:57611 The host is installed with Apple Mac OS X 10.14.5 or Safari before 12.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to cause arbitrary c ... oval:org.secpod.oval:def:57610 The host is installed with Apple Mac OS X 10.14.5 or Safari before 12.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to cause arbitrary c ... oval:org.secpod.oval:def:57604 The host is installed with Apple Mac OS X 10.14.5 or Safari before 12.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to cause arbitrary c ... oval:org.secpod.oval:def:57603 The host is installed with Apple Mac OS X 10.14.5 or Safari before 12.1.2 and is prone to an universal cross site scripting vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allows an attacker to cause universal cross site scri ... oval:org.secpod.oval:def:57602 The host is installed with Apple Mac OS X 10.14.5 or Safari before 12.1.2 and is prone to an universal cross site scripting vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allows an attacker to cause universal cross site scri ... oval:org.secpod.oval:def:57601 The host is installed with Apple Mac OS X 10.14.5 or Safari before 12.1.2 and is prone to an universal cross site scripting vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allows an attacker to cause universal cross site scri ... oval:org.secpod.oval:def:57608 The host is installed with Apple Mac OS X 10.14.5 or Safari before 12.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to cause arbitrary c ... oval:org.secpod.oval:def:57607 The host is installed with Apple Mac OS X 10.14.5 or Safari before 12.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to cause arbitrary c ... oval:org.secpod.oval:def:57606 The host is installed with Apple Mac OS X 10.14.5 or Safari before 12.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to cause arbitrary c ... oval:org.secpod.oval:def:57605 The host is installed with Apple Mac OS X 10.14.5 or Safari before 12.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to cause arbitrary c ... oval:org.secpod.oval:def:57609 The host is installed with Apple Mac OS X 10.14.5 or Safari before 12.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to cause arbitrary c ... oval:org.secpod.oval:def:57622 The host is installed with Apple Mac OS X 10.14.5 or Safari before 12.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to cause arbitrary c ... oval:org.secpod.oval:def:57621 The host is installed with Apple Mac OS X 10.14.5 or Safari before 12.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to cause arbitrary c ... oval:org.secpod.oval:def:57620 The host is installed with Apple Mac OS X 10.14.5 or before 12.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to cause arbitrary code exe ... oval:org.secpod.oval:def:57615 The host is installed with Apple Mac OS X 10.14.5 or Safari before 12.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to cause arbitrary c ... oval:org.secpod.oval:def:57614 The host is installed with Apple Mac OS X 10.14.5 or Safari before 12.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to cause arbitrary c ... oval:org.secpod.oval:def:57613 The host is installed with Apple Mac OS X 10.14.5 or Safari before 12.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to cause arbitrary c ... oval:org.secpod.oval:def:57612 The host is installed with Apple Mac OS X 10.14.5 or Safari before 12.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to cause arbitrary c ... oval:org.secpod.oval:def:57619 The host is installed with Apple Mac OS X 10.14.5 or Safari before 12.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to cause arbitrary c ... oval:org.secpod.oval:def:57618 The host is installed with Apple Mac OS X 10.14.5 or Safari before 12.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to cause arbitrary c ... oval:org.secpod.oval:def:57617 The host is installed with Apple Mac OS X 10.14.5 or Safari before 12.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to cause arbitrary c ... oval:org.secpod.oval:def:57616 The host is installed with Apple Mac OS X 10.14.5 or Safari before 12.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to cause arbitrary c ... oval:org.secpod.oval:def:57624 The host is missing a security update according to Apple advisory, APPLE-SA-2019-7-22-3. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle a malicious website. Successful exploitation could allow attackers to execute arbitrary cod ... oval:org.secpod.oval:def:54651 The host is installed with Apple Mac OS X 10.14.4 or Safari before 12.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to perform to arbitr ... oval:org.secpod.oval:def:54652 The host is installed with Apple Mac OS X 10.14.4 or Safari before 12.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to perform to arbitr ... oval:org.secpod.oval:def:54650 The host is installed with Apple Mac OS X 10.14.4 or Safari before 12.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to perform to arbitr ... oval:org.secpod.oval:def:54644 The host is installed with Apple Mac OS X 10.14.4 or Safari before 12.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to perform to arbitr ... oval:org.secpod.oval:def:54645 The host is installed with Apple Mac OS X 10.14.4 or Safari before 12.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to perform to arbitr ... oval:org.secpod.oval:def:54642 The host is installed with Apple Mac OS X 10.14.4 or Safari before 12.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to perform to arbitr ... oval:org.secpod.oval:def:54643 The host is installed with Apple Mac OS X 10.14.4 or Safari before 12.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to perform to arbitr ... oval:org.secpod.oval:def:54648 The host is installed with Apple Mac OS X 10.14.4 or Safari before 12.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to perform to arbitr ... oval:org.secpod.oval:def:54649 The host is installed with Apple Mac OS X 10.14.4 or Safari before 12.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to perform to arbitr ... oval:org.secpod.oval:def:54646 The host is installed with Apple Mac OS X 10.14.4 or Safari before 12.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to perform to arbitr ... oval:org.secpod.oval:def:54647 The host is installed with Apple Mac OS X 10.14.4 or Safari before 12.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to perform to arbitr ... oval:org.secpod.oval:def:54655 The host is missing a security update according to Apple advisory, APPLE-SA-2019-5-13-5. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle a malicious website. Successful exploitation could allow attackers to execute arbitrary cod ... oval:org.secpod.oval:def:54653 The host is installed with Apple Mac OS X 10.14.4 or Safari before 12.1.1 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to disclose process memory while p ... oval:org.secpod.oval:def:54640 The host is installed with Apple Mac OS X 10.14.4 or Safari before 12.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to perform to arbitr ... oval:org.secpod.oval:def:54641 The host is installed with Apple Mac OS X 10.14.4 or Safari before 12.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to perform to arbitr ... oval:org.secpod.oval:def:54634 The host is installed with Apple Mac OS X 10.14.4 or Safari before 12.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to perform to arbitr ... oval:org.secpod.oval:def:54637 The host is installed with Apple Mac OS X 10.14.4 or Safari before 12.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to perform to arbitr ... oval:org.secpod.oval:def:54638 The host is installed with Apple Mac OS X 10.14.4 or Safari before 12.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to perform to arbitr ... oval:org.secpod.oval:def:54635 The host is installed with Apple Mac OS X 10.14.4 or Safari before 12.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to perform to arbitr ... oval:org.secpod.oval:def:54636 The host is installed with Apple Mac OS X 10.14.4 or Safari before 12.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to perform to arbitr ... oval:org.secpod.oval:def:54639 The host is installed with Apple Mac OS X 10.14.4 or Safari before 12.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to perform to arbitr ... oval:org.secpod.oval:def:59467 The host is installed with Apple Mac OS X 10.14.6 or 10.13.6 and Safari before 13 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:59468 The host is installed with Apple Mac OS X 10.14.6 or 10.13.6 and Safari before 13 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:59469 The host is installed with Apple Mac OS X 10.14.6 or 10.13.6 and Safari before 13 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:59463 The host is installed with Apple Mac OS X 10.14.6 or 10.13.6 and Safari before 13 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allows an attacker to cause universal cross-site scripti ... oval:org.secpod.oval:def:59464 The host is installed with Apple Mac OS X 10.14.6 or 10.13.6 and Safari before 13 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allows an attacker to cause universal cross-site scripti ... oval:org.secpod.oval:def:59465 The host is installed with Apple Mac OS X 10.14.6 or 10.13.6 and Safari before 13 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:59466 The host is installed with Apple Mac OS X 10.14.6 or 10.13.6 and Safari before 13 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:59470 The host is installed with Apple Mac OS X 10.14.6 or 10.13.6 and Safari before 13 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:50320 The host is installed with Apple Safari before 12.0.3 and is prone to a memory corruption vulnerability. The flaws are present in the application, which fails to properly handle an issue in memory handling. On successful exploitation, an attacker may be able to execute arbitrary code. oval:org.secpod.oval:def:50321 The host is installed with Apple Safari before 12.0.3 and is prone to a memory corruption vulnerability. The flaws are present in the application, which fails to properly handle an issue in memory handling. On successful exploitation, an attacker may be able to execute arbitrary code. oval:org.secpod.oval:def:50322 The host is installed with Apple Safari before 12.0.3 and is prone to a memory corruption vulnerability. The flaws are present in the application, which fails to properly handle an issue in memory handling. On successful exploitation, an attacker may be able to execute arbitrary code. oval:org.secpod.oval:def:50323 The host is installed with Apple Safari before 12.0.3 and is prone to a memory corruption vulnerability. The flaws are present in the application, which fails to properly handle an issue in memory handling. On successful exploitation, an attacker may be able to execute arbitrary code. oval:org.secpod.oval:def:50324 The host is installed with Apple Safari before 12.0.3 and is prone to a memory corruption vulnerability. The flaws are present in the application, which fails to properly handle an issue in memory handling. On successful exploitation, an attacker may be able to execute arbitrary code. oval:org.secpod.oval:def:50325 The host is installed with Apple Safari before 12.0.3 and is prone to a cross site scripting vulnerability. The flaws are present in the application, which fails to properly handle a logic issue. On successful exploitation, an attacker may be able to cause universal cross site scripting. oval:org.secpod.oval:def:50326 The host is installed with Apple Safari before 12.0.3 and is prone to a memory corruption vulnerability. The flaws are present in the application, which fails to properly handle an issue in memory handling. On successful exploitation, an attacker may be able to execute arbitrary code. oval:org.secpod.oval:def:50327 The host is missing a security update according to Apple advisory, APPLE-SA-2019-1-22-5. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle a malicious website. Successful exploitation could allow attackers to execute arbitrary cod ... oval:org.secpod.oval:def:50317 The host is installed with Apple Safari before 12.0.2 and is prone to a cross site scripting vulnerability. The flaws are present in the application, which fails to properly handle a URL validation issue. On successful exploitation, an attacker may be able to cause a cross site scripting attack. oval:org.secpod.oval:def:50318 The host is installed with Apple Safari before 12.0.3 and is prone to a type confusion vulnerability. The flaws are present in the application, which fails to properly handle an issue in memory handling. On successful exploitation, an attacker may be able to execute arbitrary code. oval:org.secpod.oval:def:50319 The host is installed with Apple Safari before 12.0.3 and is prone to a memory corruption vulnerability. The flaws are present in the application, which fails to properly handle an issue in memory handling. On successful exploitation, an attacker may be able to execute arbitrary code. oval:org.secpod.oval:def:53585 The host is installed with Apple Safari before 12.1 and is prone to a cross-site scripting vulnerability. The flaws are present in the application, which fails to properly handle a logic issue. Successful exploitation of a maliciously crafted webpage may lead to universal cross site scripting. oval:org.secpod.oval:def:53584 The host is installed with Apple Safari before 12.1 and is prone to a cross-site scripting vulnerability. The flaws are present in the application, which fails to properly handle a logic issue. On successful exploitation, an attacker might cause universal cross site scripting through a maliciously c ... oval:org.secpod.oval:def:53590 The host is installed with Apple Safari before 12.1 and is prone to a memory corruption vulnerability. The flaws are present in the application, which fails to properly handle an issue in memory handling. On successful exploitation, an attacker may be able to execute arbitrary code. oval:org.secpod.oval:def:53592 The host is installed with Apple Safari before 12.1 and is prone to a memory corruption vulnerability. The flaws are present in the application, which fails to properly handle an issue in memory handling. On successful exploitation, an attacker may be able to execute arbitrary code. oval:org.secpod.oval:def:53591 The host is installed with Apple Safari before 12.1 and is prone to a memory corruption vulnerability. The flaws are present in the application, which fails to properly handle an issue in memory handling. On successful exploitation, an attacker may be able to execute arbitrary code. oval:org.secpod.oval:def:53594 The host is installed with Apple Safari before 12.1 and is prone to a memory corruption vulnerability. The flaws are present in the application, which fails to properly handle an issue in memory handling. On successful exploitation, an attacker may be able to execute arbitrary code. oval:org.secpod.oval:def:53593 The host is installed with Apple Safari before 12.1 and is prone to a memory corruption vulnerability. The flaws are present in the application, which fails to properly handle an issue in memory handling. On successful exploitation, an attacker may be able to execute arbitrary code. oval:org.secpod.oval:def:53596 The host is installed with Apple Safari before 12.1 and is prone to a memory corruption vulnerability. The flaws are present in the application, which fails to properly handle an issue in memory handling. On successful exploitation, an attacker may be able to execute arbitrary code. oval:org.secpod.oval:def:53595 The host is installed with Apple Safari before 12.1 and is prone to a memory corruption vulnerability. The flaws are present in the application, which fails to properly handle an issue in memory handling. On successful exploitation, an attacker may be able to execute arbitrary code. oval:org.secpod.oval:def:53587 The host is installed with Apple Safari before 12.1 and is prone to a memory corruption vulnerability. The flaws are present in the application, which fails to properly handle an issue in memory handling. On successful exploitation, an attacker may be able to execute arbitrary code. oval:org.secpod.oval:def:53586 The host is installed with Apple Safari before 12.1 and is prone to a type confusion vulnerability. The flaws are present in the application, which fails to properly handle an issue in memory handling. On successful exploitation, an attacker may be able to execute arbitrary code. oval:org.secpod.oval:def:53589 The host is installed with Apple Safari before 12.1 and is prone to a memory corruption vulnerability. The flaws are present in the application, which fails to properly handle an issue in memory handling. On successful exploitation, an attacker may be able to execute arbitrary code. oval:org.secpod.oval:def:53588 The host is installed with Apple Safari before 12.1 and is prone to a memory corruption vulnerability. The flaws are present in the application, which fails to properly handle an issue in memory handling. On successful exploitation, an attacker may be able to execute arbitrary code. oval:org.secpod.oval:def:53551 The host is installed with Apple Mac OS X 10.14.4 or Safari before 12.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows an attacker to perform to arbitr ... oval:org.secpod.oval:def:53598 The host is installed with Apple Safari before 12.1 and is prone to a use after free vulnerability. The flaws are present in the application, which fails to properly handle an issue in memory handling. Successful exploitation of a maliciously crafted web content may lead to arbitrary code execution. oval:org.secpod.oval:def:53597 The host is installed with Apple Safari before 12.1 and is prone to a cross-origin vulnerability. A flaw is present in the application, which fails to properly handle an issue in fetch API. Successful exploitation of a maliciously crafted web content may disclose sensitive user information. oval:org.secpod.oval:def:53599 The host is installed with Apple Safari before 12.1 and is prone to a use after free vulnerability. The flaws are present in the application, which fails to properly handle an issue in memory handling. Successful exploitation of a maliciously crafted web content may lead to arbitrary code execution. oval:org.secpod.oval:def:53600 The host is installed with Apple Safari before 12.1 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. On successful exploitation, a malicious website may be able to execute scripts in the context of another webs ... oval:org.secpod.oval:def:53602 The host is installed with Apple Safari before 12.1 and is prone to a memory corruption vulnerability. The flaws are present in the application, which fails to properly handle an issue in memory handling. On successful exploitation, a sandboxed process may be able to circumvent sandbox restrictions. oval:org.secpod.oval:def:53601 The host is installed with Apple Safari before 12.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation of a maliciously crafted web content may result in the disclosure of process m ... oval:org.secpod.oval:def:53604 The host is missing a security update according to Apple advisory, APPLE-SA-2019-3-25-4. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle a malicious website. Successful exploitation could allow attackers to execute arbitrary cod ... oval:org.secpod.oval:def:53603 The host is installed with Apple Safari before 12.1 and is prone to a universal cross site scripting vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. On successful exploitation, a maliciously crafted web content may lead to universal cross site scrip ... oval:org.secpod.oval:def:59860 The host is installed with Safari before 13.0.4 on Apple Mac OS X 10.13.6, 10.14.6 or 10.15 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle malicious web content. Successful exploitation could allow attackers to execute arbitrar ... oval:org.secpod.oval:def:59861 The host is installed with Safari before 13.0.4 on Apple Mac OS X 10.13.6, 10.14.6 or 10.15 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle malicious web content. Successful exploitation could allow attackers to execute arbitrar ... oval:org.secpod.oval:def:59862 The host is missing a security update according to Apple advisory, APPLE-SA-2019-12-10-6. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle a malicious web content. Successful exploitation could allow attackers to execute arbitrar ... oval:org.secpod.oval:def:59859 The host is installed with Safari before 13.0.4 on Apple Mac OS X 10.13.6, 10.14.6 or 10.15 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to properly handle malicious web content. Successful exploitation could allow attackers to execute arbitrary c ... oval:org.secpod.oval:def:58772 The host is missing a security update according to Apple advisory, APPLE-SA-2019-9-26-9. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle a malicious website. Successful exploitation could allow attackers to obtain sensitive info ... oval:org.secpod.oval:def:3165 The host is installed with Apple Mac OS X 10.6.8 or iTunes before 10.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly perform string tokenization. Successful exploitation could allow attackers to crash the service or execute arbitrary ... oval:org.secpod.oval:def:3118 The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.2 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle H.264 encoded movie files. Successful exploitation could allow attackers to execute arbitrary code or crash the service. oval:org.secpod.oval:def:2854 The host is installed with Apple Mac OS X 10.5.8 or 10.6 through 10.6.7 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the application, as it fails to handle TIFF images. Successful exploitation could allow attackers to execute arbitrary code or crash the service. oval:org.secpod.oval:def:2882 The host is installed with Apple iTunes before 10.2 or Apple Safari 5.0.4 or Apple Mac OS X 10.6.0 through 10.6.6 and is prone to buffer overflow vulnerability. A flaw is present in the application which fails to handle a crafted TIFF image with JPEG encoding. Successful exploitation could allow re ... oval:org.secpod.oval:def:2883 The host is installed with Apple iTunes before 10.2 or Apple Safari 5.0.4 or Apple Mac OS X 10.6.0 through 10.6.6 and is prone to buffer overflow vulnerability. A flaw is present in the application which fails to handle a crafted TIFF Internet Fax image file. Successful exploitation could allow remo ... oval:org.secpod.oval:def:2675 The host is installed with Google Chrome before 8.0.552.215 or Apple Safari before 5.0.4 or Apple iTunes before 10.2 and is prone to double free vulnerability. A flaw is present in the applications which fail in libxml's handling of XPath expressions. Successful exploitation allows remote attackers ... oval:org.secpod.oval:def:2678 The host is installed with Google Chrome before 7.0.517.44 or Apple Safari before 5.0.4 and is prone to denial of service vulnerability. A flaw is present in the application which fails to properly handle memory. Successful exploitation allows remote attackers to cause a denial of service (applicati ... oval:org.secpod.oval:def:2938 The host is installed with Apple iTunes before 10.2 or Apple Safari 5.0.4 or Apple Mac OS X 10.6.0 through 10.6.6 and is prone to memory leak vulnerability. A flaw is present in the application which fails to handle a crafted International Color Consortium (ICC) profile in a JPEG image. Successful e ... oval:org.secpod.oval:def:3504 The host is installed with Apple Mac OS X 10.5.8 or Apple Mac OS X 10.6 before 10.6.2 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted TIFF image. Successful exploitation could allow attackers to crash the service or execute arbit ... oval:org.secpod.oval:def:54601 The host is installed with Jenkins LTS before 2.138.2 or Jenkins rolling release before 2.146 is prone to a remote code execution vulnerability. The flaw is present in the application, which fails to properly handle an issue in Stapler web framework. Successful exploitation allow attackers to obtain ... oval:org.secpod.oval:def:57679 The host is installed with Jenkins LTS through 2.176.1 or Jenkins rolling release through 2.185 and is prone to a path traversal vulnerability. A flaw is present in the application, which fails to properly handle an issue in core/src/main/java/hudson/model/FileParameterValue.java file. Successful ex ... oval:org.secpod.oval:def:57680 The host is installed with Jenkins LTS through 2.176.1 or Jenkins rolling release through 2.185 and is prone to a cross-site request forgery vulnerability. A flaw is present in the application, which fails to properly handle an issue in usage of CSRF tokens. Successful exploitation could allow attac ... oval:org.secpod.oval:def:57681 The host is installed with Jenkins LTS through 2.176.1 or Jenkins rolling release through 2.185 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an issue in Stapler web framework. Successful exploitation could allow attacke ... oval:org.secpod.oval:def:58823 The host is installed with Jenkins LTS through 2.176.3 or Jenkins rolling release through 2.196 and is prone to a stored cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in f:expandableTextBox form controls. Successful exploitation cou ... oval:org.secpod.oval:def:58824 The host is installed with Jenkins LTS through 2.176.3 or Jenkins rolling release through 2.196 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in f:combobox form controls. Successful exploitation could allow attacke ... oval:org.secpod.oval:def:58825 The host is installed with Jenkins LTS through 2.176.3 or Jenkins rolling release through 2.196 and is prone to a stored cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in escaping tag name on a tooltip. Successful exploitation could ... oval:org.secpod.oval:def:58826 The host is installed with Jenkins LTS through 2.176.3 or Jenkins rolling release through 2.196 and is prone to a stored cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in escaping the reason a queue item is blocked in tooltips. Succe ... oval:org.secpod.oval:def:58827 The host is installed with Jenkins LTS through 2.176.3 or Jenkins rolling release through 2.196 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in the WhoAmI URL. Successful exploitation could allow attackers to obta ... oval:org.secpod.oval:def:58828 The host is installed with Jenkins LTS through 2.176.3 or Jenkins rolling release through 2.196 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in filtering the values specified by administrators as jenkins root URL. ... oval:org.secpod.oval:def:65207 The host is installed with Jenkins LTS through 2.235.4 or Jenkins rolling release through 2.242 and is prone to a buffer corruption vulnerability. A flaw is present in the application, which fails to properly handle issues in Jetty. Successful exploitation could allow unauthenticated attackers to ob ... oval:org.secpod.oval:def:73690 The host is installed with Jenkins LTS through 2.289.1 or Jenkins rolling release through 2.299 and is prone to an incorrect authorization vulnerability. A flaw is present in the application, which fails to properly handle issues with permission checks. Successful exploitation could allows users to ... oval:org.secpod.oval:def:73691 The host is installed with Jenkins LTS through 2.289.1 or Jenkins rolling release through 2.299 and is prone to a session fixation vulnerability. A flaw is present in the application, which fails to properly handle issues with validation of sessions. Successful exploitation could allows attackers to ... oval:org.secpod.oval:def:7567 The host is installed with Oracle Java SE 6 Update 35 or earlier or JavaFX 2.2 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle specially crafted content. Successful exploitation allows attackers to affect confidentiality, integrity, a ... oval:org.secpod.oval:def:7568 The host is installed with Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to deployment. Successful exploitation allows attackers to affect confidentiality, integrity, and availability. oval:org.secpod.oval:def:7569 The host is installed with Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to deployment. Successful exploitation allows attackers to affect confidentiality, integrity, and availability. oval:org.secpod.oval:def:7570 The host is installed with Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 35 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to JMX. Successful exploitation allows attackers to affect confidentiality, integri ... oval:org.secpod.oval:def:7571 The host is installed with Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to deployment. Successful exploitation allows attackers to affect confidentiality, integrity, and availability. oval:org.secpod.oval:def:7572 The host is installed with Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Libraries. Successful exploitation allows remote attackers to affect confidentiality. oval:org.secpod.oval:def:7573 The host is installed with Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Hotspot. Successful exploitation allows attackers to affect confidentiality and integrity. oval:org.secpod.oval:def:7574 The host is installed with Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Libraries. Successful exploitation allows remote attackers to affect confidentiality, integrity, and availability ... oval:org.secpod.oval:def:7575 The host is installed with Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Concurrency. Successful exploitation allows remote attackers to affect confidentiality and integrity. oval:org.secpod.oval:def:7576 The host is installed with Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to JMX. Successful exploitation allows attackers to affect confidentiali ... oval:org.secpod.oval:def:7577 The host is installed with Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Security. Successful exploitation allows attackers to affect confidentiality. oval:org.secpod.oval:def:7578 The host is installed with Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Libraries. Successful exploitation allows remote attackers to affect integrity. oval:org.secpod.oval:def:7579 The host is installed with Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to JMX. Successful exploitation allows attackers to affect confidentiali ... oval:org.secpod.oval:def:7580 The host is installed with Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Security. Successful exploitation allows attackers to affect confidentiality. oval:org.secpod.oval:def:7581 The host is installed with Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Libraries. Successful exploitation allows remote attackers to affect integrity. oval:org.secpod.oval:def:7582 The host is installed with Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to JSSE. Successful exploitation allows remote attackers to affect availability. oval:org.secpod.oval:def:7583 The host is installed with Oracle Java SE 6 Update 35 or earlier or Java FX 2.2 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related 2D. Successful exploitation allows remote attackers to affect confidentiality, integrity, ... oval:org.secpod.oval:def:7584 The host is installed with Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related Swing. Successful exploitation allows attackers to affect confidentiality, integrity, and availability. oval:org.secpod.oval:def:7585 The host is installed with Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Beans. Successful exploitation allows attackers to affect confidentiality, integrity, and availability. oval:org.secpod.oval:def:7586 The host is installed with Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to JMX. Successful exploitation allows attackers to affect confidentiality, availability and integrity. oval:org.secpod.oval:def:7587 The host is missing important security update according to Apple advisory, APPLE-SA-2012-10-16-1. The update is required to fix multiple unspecified vulnerabilities. The flaws are present in the application, which fails to properly handle certain vectors. Successful exploitation allows attackers to ... oval:org.secpod.oval:def:77528 The host is installed with Apple Mac OS 12 before 12.2 or Apple Safari before 15.3 on Apple Mac OS 10.15.7 or Apple Mac OS 11 and is prone to a cross-origin scripting vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. On successful exploita ... oval:org.secpod.oval:def:77525 The host is installed with Apple Mac OS 12 before 12.2 or Apple Safari before 15.3 on Apple Mac OS 10.15.7 or Apple Mac OS 11 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. On successful exploitation ... oval:org.secpod.oval:def:77511 The host is missing a security update according to Apple advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle multiple issues. On successful exploitation, allow attackers to execute arbitrary code. oval:org.secpod.oval:def:21354 The host is installed with Apple Mac OS X or Server 10.7 through 10.7.5, 10.8 through 10.8.5 or 10.9 through 10.9.5 and is prone to arbitrary code execution vulnerability. A flaw is present in the Bash's parsing of environment variables, which fails to properly handle a crafted environment. Successf ... oval:org.secpod.oval:def:21355 The host is installed with Apple Mac OS X or Server 10.7 through 10.7.5, 10.8 through 10.8.5 or 10.9 through 10.9.5 and is prone to arbitrary code execution vulnerability. A flaw is present in the Bash's parsing of environment variables, which fails to properly handle a crafted environment. Successf ... oval:org.secpod.oval:def:21353 The host is missing a security update according to Apple advisory, APPLE-SA-2014-09-29-1. The update is required to fix arbitrary code execution vulnerability. The flaw is present in the Bash's parsing of environment variables, which fails to handle certain vectors related to memory and crafted data ... oval:org.secpod.oval:def:21790 The host is installed with Apple Mac OS X or Server before 10.10 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted environment. Successful exploitation allows attackers to execute arbitrary code. oval:org.secpod.oval:def:21791 The host is installed with Apple Mac OS X or Server before 10.10 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted environment. Successful exploitation allows attackers to execute arbitrary code. oval:org.secpod.oval:def:3166 The host is installed with Apple Mac OS X 10.7 before 10.7.3 and is prone to a information disclosure vulnerability. A flaw is present in the application, which fails to restrict transmission of cookies. Successful exploitation could allow attackers to obtain sensitive information. oval:org.secpod.oval:def:5795 The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.4 and is prone to a man in the middle attack vulnerability. A flaw is present in the application, which fails to properly handle confidentiality of SSL encrypted data. Successful exploitation could allow attackers to decrypt data ... oval:org.secpod.oval:def:14154 The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.3, Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to man in the middle attack vulnerability. A flaw is present in the application, which can encryp ... oval:org.secpod.oval:def:14155 The host is installed with OS X Mountain Lion 10.8 through 10.8.3 is prone to Privelege escalation vulnerability. A flaw is present in the application, which allows local users in the lpadmin group to read or write arbitrary files. Successful exploitation could allow an attacker to execute arbitrary ... oval:org.secpod.oval:def:15480 The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to denial of service vulnerability.The flaw is present in the OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d, which fails t ... oval:org.secpod.oval:def:14153 The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.3, Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to han ... oval:org.secpod.oval:def:15481 The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to information Disclosure Vulnerability. The flaw is present in the The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in O ... oval:org.secpod.oval:def:14151 The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.3, Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to information disclosure vulnerability. A flaw is present in the application, which does not pro ... oval:org.secpod.oval:def:15465 The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to cross site scripting vulnerability. The flaw is present in the balancer_handler function in the manager interface in mod_proxy_balancer.c in ... oval:org.secpod.oval:def:15463 The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to information disclosure vulnerability .The flaw is present in the in the make_variant_list function in mod_negotiation.c in the mod_negotiatio ... oval:org.secpod.oval:def:15464 The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to multiple cross site scripting vulnerabilities .The flaw is present in the application, which fails. Successful exploitation could allow atta ... oval:org.secpod.oval:def:5814 The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle Exception#to_s method. Successful exploitation could allow context-dependent attackers to modify strings. oval:org.secpod.oval:def:5807 The host is installed with Apple Mac OS X 10.7.0 before 10.7.4 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a request containing a large number of variables. Successful exploitation could allow attackers to execute ar ... oval:org.secpod.oval:def:5806 The host is installed with Apple Mac OS X 10.7.0 before 10.7.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly restrict the ability to trigger hash collisions. Successful exploitation could allow attackers to cause a denial of service. oval:org.secpod.oval:def:5805 The host is installed with Apple Mac OS X 10.7.0 before 10.7.4 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted offset_val value in an EXIF header in a JPEG file. Successful exploitation could allow attackers to read th ... oval:org.secpod.oval:def:10711 The host is installed with Mac OS X 10.6.8 or 10.7 before 10.7.5 or 10.8.x before 10.8.2 and is prone to a SQL injection vulnerability. A flaw is present in the application, which fails to properly perform a temporary change to the magic_quotes_gpc directive during the importing of environment varia ... oval:org.secpod.oval:def:10712 The host is installed with Mac OS X 10.6.8 or 10.7 before 10.7.5 or 10.8.x before 10.8.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle invalid [ (open square bracket) characters in name values. Successful exploitation could al ... oval:org.secpod.oval:def:20189 The host is installed with Apple Mac OS X or Server 10.9 through 10.9.3 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to properly handle NTLM connections. Successful exploitation allowed an attacker to gain access to another user's session. oval:org.secpod.oval:def:3891 The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a memory corruption vulnerability. The flaw is present in the application, which fails to properly perform OpenGL Shading Language (aka GLSL) compilation. Successful exploitation could allow attackers to execute ... oval:org.secpod.oval:def:3892 The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to an integer overflow vulnerability. The flaw is present in the application, which fails to properly handle crafted DNS data. Successful exploitation could allow attackers to execute arbitrary code or crash the se ... oval:org.secpod.oval:def:3890 The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a memory corruption vulnerability. The flaw is present in the application, which fails to handle a crafted MP4 file. Successful exploitation could allow attackers to execute arbitrary code or crash the service. oval:org.secpod.oval:def:3895 The host is installed with Apple Mac OS X 10.7.x before 10.7.3 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to properly handle a crafted embedded font in a document. Successful exploitation could allow attackers to execute arbitrary code or cause ... oval:org.secpod.oval:def:3896 The host is installed with Apple Mac OS X 10.7.x before 10.7.3 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted movie file with H.264 encoding. Successful exploitation could allow attackers to execute arbitrary ... oval:org.secpod.oval:def:3893 The host is installed with Apple Mac OS X 10.7.x before 10.7.3 and is prone to an information disclosure vulnerability. The flaw is present in the application, which fails to preserve the Wi-Fi configuration across software updates. Successful exploitation could allow attackers to obtain sensitive i ... oval:org.secpod.oval:def:3894 The host is installed with Apple Mac OS X 10.7.x before 10.7.3 and is prone to a memory corruption vulnerability. The flaw is present in the application, which fails to properly restrict the allocation of stack memory. Successful exploitation could allow attackers to execute arbitrary code or cause ... oval:org.secpod.oval:def:3899 The host is installed with Apple Mac OS X 10.7.x before 10.7.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which returns incorrect results for a maliciously crafted hostname. Successful exploitation could allow attackers to disclose sensitive inform ... oval:org.secpod.oval:def:3897 The host is installed with Apple Mac OS X 10.7.x before 10.7.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly construct request headers during parsing of URLs. Successful exploitation could allow attackers to obtain sensitive in ... oval:org.secpod.oval:def:3898 The host is installed with Apple Mac OS X 10.7.x before 10.7.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which automatically switches it to unencrypted sessions upon failure of encrypted connections. Successful exploitation could allow attackers t ... oval:org.secpod.oval:def:3888 The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a buffer overflow vulnerability. The flaw is present in the application, which fails to handle a crafted PNG file. Successful exploitation could allow attackers to execute arbitrary code or crash the service. oval:org.secpod.oval:def:3889 The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to an Off-by-one buffer overflow vulnerability. The flaw is present in the application, which fails to handle a crafted rdrf atom in a movie file. Successful exploitation could allow attackers to execute arbitrary ... oval:org.secpod.oval:def:3887 The host is installed with Apple Mac OS X 10.7.x before 10.7.3 and is prone to an information disclosure vulnerability. The flaw is present in the application, which fails to verify the unique identifier of its remote AFP volume or Time Capsule. Successful exploitation could allow attackers to obtai ... oval:org.secpod.oval:def:3929 The host is installed with Apple Mac OS X 10.6.8 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a modified POP3 port number. Successful exploitation could allow remote authenticated users to bypass firewall restrictions. oval:org.secpod.oval:def:3927 The host is installed with Apple Mac OS X 10.6.8 and is prone to a click-jacking attack vulnerability. A flaw is present in the application, which fails to prevent page rendering inside a frame in a third-party HTML document. Successful exploitation could allow attackers to inject arbitrary code. oval:org.secpod.oval:def:3928 The host is installed with Apple Mac OS X 10.6.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle properly handle 8-bit characters in passwords. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3910 The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which returns the value of the salt argument instead of the hashed string. Successful exploitation could allow attackers to bypass authentic ... oval:org.secpod.oval:def:3911 The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly check the return values of the malloc, calloc, and realloc library functions. Successful exploitation could ... oval:org.secpod.oval:def:3914 The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle passwords with 8-bit characters. Successful exploitation could allow attackers to obtain sensitive in ... oval:org.secpod.oval:def:3915 The host is installed with Apple Mac OS X 10.6.8 and is prone to an information disclosure vulnerability. A flaw is present in the application, which incorrectly creates log entries containing passwords upon encountering errors in JMX user creation. Successful exploitation could allow attackers to o ... oval:org.secpod.oval:def:3912 The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly check web script or HTML injected to the the _mbox parameter. Successful exploitation could allow attackers to ... oval:org.secpod.oval:def:3907 The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a memory corruption vulnerability. The flaw is present in the application, which fails to properly handle crafted JPEG2000 image file. Successful exploitation could allow attackers to execute arbitrary code or c ... oval:org.secpod.oval:def:3908 The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle FLC encoded movie files. Successful exploitation could allow attackers to execute arbitrary code or crash the ... oval:org.secpod.oval:def:3905 The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a denial of service vulnerability. The flaw is present in the application, which fails to properly handle a crafted font. Successful exploitation could allow attackers to execute arbitrary code or crash the serv ... oval:org.secpod.oval:def:3906 The host is installed with Apple Mac OS X 10.6.8 and is prone to a buffer overflow vulnerability. The flaw is present in the application, which fails to properly handle maliciously crafted audio content. Successful exploitation could allow attackers to execute arbitrary code or crash the service. oval:org.secpod.oval:def:3909 The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to an integer signedness error vulnerability. A flaw is present in the application, which fails to properly handle a crafted font table in a QuickTime movie file. Successful exploitation could allow attackers to ex ... oval:org.secpod.oval:def:3921 The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3922 The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a request for a baselined WebDAV resource. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3920 The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a replay REPORT operation. Successful exploitation could allow attackers to obtain sensitive information. oval:org.secpod.oval:def:3926 The host is installed with Apple Mac OS X 10.6.8 and is prone to a multiple cross site scripting vulnerabilities. The flaws are present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to inject arbitrary web script or HTML. oval:org.secpod.oval:def:3923 The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle certain flags arguments. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3924 The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the application, which fails to handle crafted THUNDER_2BITDELTAS data in a .tiff file that has an unexpected BitsPerSample value. Successful expl ... oval:org.secpod.oval:def:3918 The host is installed with Apple Mac OS X 10.6.8 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle a crafted STYLE element in an e-mail message. Successful exploitation could allow attackers to inject arbitrary web script or HTML. oval:org.secpod.oval:def:3919 The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a long pathname for a UNIX socket. Successful exploitation could allow attackers to execute arbitrary code ... oval:org.secpod.oval:def:3916 The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly restrict filenames in multipart/form-data POST requests. Successful exploitation could allow attackers to conduct ab ... oval:org.secpod.oval:def:3917 The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which unconditionally performs credential delegation. Successful exploitation could allow attackers to impersonate clients via GSSAPI reques ... oval:org.secpod.oval:def:3900 The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a certificate spoofing vulnerability. The flaw is present in the application, which fails to properly handle an untrusted attribute of a certification authority certificate. Successful exploitation could allow a ... oval:org.secpod.oval:def:3903 The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a buffer overflow vulnerability. The flaw is present in the application, which fails to properly handle a long salt argument. Successful exploitation could allow attackers to produce unspecified impacts. oval:org.secpod.oval:def:3904 The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a denial of service vulnerability. The flaw is present in the application, which fails to properly implement the error_log function. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3901 The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a denial of service vulnerability. The flaw is present in the application, which fails to properly handle a malformed HTTP request. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3902 The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a denial of service vulnerability. The flaw is present in the application, which fails to properly handle a malformed PNG image. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:26697 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle vectors related to connecting to the standard input, output and error file descriptors of another terminal. Success ... oval:org.secpod.oval:def:26696 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a system clock and sudo user timestamp with epoch. Successful exploitation allows local users or physically proxima ... oval:org.secpod.oval:def:26699 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle vectors related to connecting to the standard input, output and error file descriptors of another terminal. Success ... oval:org.secpod.oval:def:26698 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle vectors related to connecting to the standard input, output and error file descriptors of another terminal. Success ... oval:org.secpod.oval:def:17026 The host is installed with Apple Mac OS X or Server 10.7.5, 10.8.5, 10.9 or 10.9.1 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate. Success ... oval:org.secpod.oval:def:17025 The host is installed with Apple Mac OS X or Server 10.7.5, 10.8.5, 10.9 or 10.9.1 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate. Success ... oval:org.secpod.oval:def:17006 The host is installed with Apple Mac OS X or Server 10.7.5, 10.8.5, 10.9 or 10.9.1 and is prone to remote code execution vulnerability. A flaw is present in the mod_rewrite module in the Apache HTTP Server, which fails to handle an HTTP request containing an escape sequence for a terminal emulator. ... oval:org.secpod.oval:def:17008 The host is installed with Apple Mac OS X or Server 10.7.5, 10.8.5, 10.9 or 10.9.1 and is prone to remote code execution vulnerability. A flaw is present in the mod_rewrite module in the Apache HTTP Server, which fails to handle an HTTP request containing an escape sequence for a terminal emulator. ... oval:org.secpod.oval:def:5793 The host is installed with Apple Mac OS X 10.7.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly restrict what is written to the system log for network logins. Successful exploitation could allow attackers to obtain sensitive inf ... oval:org.secpod.oval:def:3137 The host is installed with Apple Mac OS X 10.6.8 and is prone to denial of service vulnerability. The flaw is caused due to integer signedness error in zip_stream.c in the Zip extension. Successful exploitation could allow remote attackers to cause a denial of service via a malformed archive file th ... oval:org.secpod.oval:def:3138 The host is installed with Apple Mac OS X and is prone to denial of Service vulnerability. The flaw is present in stream_get_contents function, which fails to handle ziparchive stream. Successful exploitation could allow remote attackers to cause a denial of service via a ziparchive stream. oval:org.secpod.oval:def:3139 The host is installed with Apple Mac OS X 10.6.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle streams component properly. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3143 The host is installed with Apple Mac OS X 10.6.8 and is prone to integer overflow vulnerability. A flaw in present in ext/shmop/shmop.c, which fails to handle overly long arguments passed to shmop_read() function. Successful exploitation could allow remote attackers to execute arbitrary code or caus ... oval:org.secpod.oval:def:3144 The host is installed with Apple Mac OS X and is prone to a denial of Service vulnerability. The flaw is present exif.c in the Exif extension in PHP , which performs an incorrect cast. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3141 The host is installed with Apple Mac OS X 10.6.8 and is prone to denial of Service vulnerability. The flaw is caused due to integer overflow in the SdnToJulian function in the Calendar extension in PHP. Successful exploitation could allow remote attackers to cause a denial of service via a large int ... oval:org.secpod.oval:def:3142 The host is installed with Apple Mac OS X 10.6.8 and is prone to format string vulnerability. A flaw in present in phar_object.c, which improperly calls zend_throw_exception_ex() function when format string specifiers are passed in an argument to a class method. Successful exploitation could allow r ... oval:org.secpod.oval:def:3145 The host is installed with Apple Mac OS X 10.6.8 and is prone to denial of service vulnerability. The flaw is present in _zip_name_locate function in zip_name_locate.c in the Zip extension, which fails to handle a ZIPARCHIVE::FL_UNCHANGED argument. Successful exploitation could allow attackers to cr ... oval:org.secpod.oval:def:3146 The host is installed with Apple Mac OS X 10.6.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle an invalid size argument, which triggers a NULL pointer dereference. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3140 The host is installed with Apple Mac OS X 10.6.8 and is prone to Denial of Service vulnerability. The flaw is due to unspecified vulnerability in the NumberFormatter::setSymbol in the Intl extension in PHP. Successful exploitation could allow remote attackers to cause a denial of service via an inva ... oval:org.secpod.oval:def:3111 The host is installed with Apple Mac OS X 10.7 before 10.7.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a negative response containing large RRSIG RRsets. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:60014 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in OpenLDAP. Successful exploitation allows an attacker to encounter multiple issues ... oval:org.secpod.oval:def:15483 The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to an unspecified vulnerability. The flaw is present in the the SOAP parser in PHP before 5.3.22 and 5.4.x before 5.4.13, which fails to handle ... oval:org.secpod.oval:def:15466 The host is installed with Apple Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to denial of service vulnerability. The flaw is present in the ISC BIND 9.4.x, 9.5.x, 9.6.x, and 9.7.x before 9.7.6-P2; 9.8.x before 9.8.3-P2; 9.9.x before 9.9.1-P2; and 9.6-ES ... oval:org.secpod.oval:def:15467 The host is installed with Apple Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to denial of service vulnerability. The flaw is present in the ISC BIND 9.x before 9.7.6-P3, 9.8.x before 9.8.3-P3, 9.9.x before 9.9.1-P3, and 9.4-ESV and 9.6-ESV before 9.6-ES ... oval:org.secpod.oval:def:15468 The host is installed with Apple Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to denial of service vulnerability. The flaw is present in the ISC BIND 9.x before 9.7.6-P4, 9.8.x before 9.8.3-P4, 9.9.x before 9.9.1-P4, and 9.4-ESV and 9.6-ESV before 9.6-ES ... oval:org.secpod.oval:def:15470 The host is installed with Apple Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to denial of service vulnerability. The flaw is present in the libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before ... oval:org.secpod.oval:def:59996 The host is installed with Apple Mac OS X 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues. oval:org.secpod.oval:def:59997 The host is installed with Apple Mac OS X 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues. oval:org.secpod.oval:def:59998 The host is installed with Apple Mac OS X 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues. oval:org.secpod.oval:def:59999 The host is installed with Apple Mac OS X 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues. oval:org.secpod.oval:def:59970 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to execute arbitr ... oval:org.secpod.oval:def:59967 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to execute arbitr ... oval:org.secpod.oval:def:59968 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to execute arbitr ... oval:org.secpod.oval:def:59969 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to execute arbitr ... oval:org.secpod.oval:def:5817 The host is installed with Apple Mac OS X 10.6.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted RPC call. Successful exploitation could allow attackers to execute arbitrary code or crash the service. oval:org.secpod.oval:def:5820 The host is missing an important security update according to Apple advisory, APPLE-SA-2012-05-09-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to execute ... oval:org.secpod.oval:def:10695 The host is installed with Mac OS X 10.6.8 or OS X Lion v10.7 to v10.7.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which is caused by an error in mod_proxy when configured in reverse proxy mode and using the RewriteRule or ProxyPassMatch directive ... oval:org.secpod.oval:def:10696 The host is installed with Mac OS X 10.6.8 or OS X Lion v10.7 to v10.7.4 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header. Successful ex ... oval:org.secpod.oval:def:10697 The host is installed with Mac OS X 10.6.8 or OS X Lion v10.7 to v10.7.4 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to interact with use of RewriteRule and ProxyPassMatch pattern matches for configuration of a reverse proxy. Successful exp ... oval:org.secpod.oval:def:10699 The host is installed with Mac OS X 10.6.8 or OS X Lion v10.7 to v10.7.4 and is prone to a denial of service vulnerability. A flaw is present in the application, due to an invalid call to the free function. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:10705 The host is installed with Mac OS X 10.6.8 or OS X Lion v10.7 to v10.7.4 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted tiff image. Successful exploitation could allow attackers to execute arbitrary code or crash the service. oval:org.secpod.oval:def:10706 The host is installed with Mac OS X 10.6.8 or OS X Lion v10.7 to v10.7.4 and is prone to a stack based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted locale ID that is not properly handled during variant canonicalization. Successful exploitation ... oval:org.secpod.oval:def:10707 The host is installed with OS X Lion v10.7 to v10.7.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a crafted program. Successful exploitation could allow attackers to bypass sandbox restrictions and execute arbitrary code. oval:org.secpod.oval:def:10708 The host is installed with Mac OS X 10.8.x before 10.8.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted application from reading passwords entered into Login Window. Successful exploitation could allow attackers to read ... oval:org.secpod.oval:def:10709 The host is installed with Mac OS X 10.6.8 or OS X Lion v10.7 to v10.7.4 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle an e-mail message that triggers the loading of a third-party plugin. Successful exploitation could allow att ... oval:org.secpod.oval:def:10700 The host is installed with Mac OS X 10.6.8 or OS X Lion v10.7 to v10.7.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted web script. Successful exploitation could allow attackers to obtain the values of HTTPOnly cookies. oval:org.secpod.oval:def:10701 The host is installed with Mac OS X Lion v10.7 to v10.7.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle reachable assertion issue existed in the handling of DNS records. Successful exploitation could allow attackers to crash the servic ... oval:org.secpod.oval:def:10702 The host is installed with Mac OS X Lion v10.7 to v10.7.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted text glyph. Successful exploitation could allow attackers to execute arbitrary code or crash the service. oval:org.secpod.oval:def:10703 The host is installed with Mac OS X 10.6.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to perform proper bounds checking. Successful exploitation could allow attackers to execute arbitrary code or crash the service. oval:org.secpod.oval:def:10704 The host is installed with Mac OS X 10.6.8 or OS X Lion v10.7 to v10.7.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted text chunk in a PNG image file. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:10717 The host is installed with Mac OS X 10.6.8 or 10.7 before 10.7.5 or 10.8.x before 10.8.2 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation allows remote attackers to produce an unspecified impact. oval:org.secpod.oval:def:10718 The host is installed with Mac OS X 10.7 before 10.7.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation allows remote attackers to execute arbitrary code or crash the service. oval:org.secpod.oval:def:10719 The host is installed with OS X Lion v10.7 to v10.7.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly perform authentication for the Device Management private interface. Successful exploitation could allow attackers to enumerate ... oval:org.secpod.oval:def:10710 The host is installed with Mac OS X 10.8.x before 10.8.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to create password hash only when mobile account is used as an external account. Successful exploitation could allow attackers to obtain ... oval:org.secpod.oval:def:10720 The host is installed with Mac OS X 10.6.8 or 10.7 before 10.7.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted .pict file. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service ... oval:org.secpod.oval:def:10721 The host is installed with Mac OS X 10.6.8 or 10.7 before 10.7.5 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted sean atom in a movie file. Successful exploitation allows remote attackers to execute arbitrary code or cause a de ... oval:org.secpod.oval:def:10722 The host is installed with Mac OS X 10.6.8 or 10.7 before 10.7.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted movie file with Sorenson encoding. Successful exploitation allows remote attackers to execute arbitrary code or ca ... oval:org.secpod.oval:def:10723 The host is installed with Mac OS X 10.6.8 or 10.7 before 10.7.5 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted movie file with RLE encoding. Successful exploitation allows remote attackers to execute arbitrary code or cause a d ... oval:org.secpod.oval:def:10724 The host is installed with Mac OS X 10.7 before 10.7.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle USB hub descriptors. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service. oval:org.secpod.oval:def:4246 The host is installed with Google Chrome before 17.0.963.56 or Apple Mac OS X 10.6.8 or OS X 10.7.0 before 10.7.4 and is prone to an integer overflow vulnerability. A flaw is present in the applications, which fail to handle unknown vectors that trigger an integer truncation. Successful exploitation ... oval:org.secpod.oval:def:3814 The host is installed with Apple Mac OS X before 10.6.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle floating point binary to text conversion. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3033 The host is installed with PHP 5.3.x through 5.3.3 and is prone to a format string vulnerability. A flaw is present in the application, which fails to handle a crafted phar:// URI. Successful exploitation could allow attackers to obtain sensitive information. oval:org.secpod.oval:def:3034 The host is installed with PHP 5.2.x through 5.2.14 and 5.3.x through 5.3.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted ZIP archive. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3031 The host is installed with GNU Mailman before 2.1.14rc1 and is prone to multiple cross site scripting vulnerabilities. A flaw is present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to inject arbitrary script. oval:org.secpod.oval:def:3037 The host is installed with PHP 5.2 before 5.2.15 and 5.3 before 5.3.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:3038 The host is installed with PHP 5.3.3 and earlier and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle an invalid argument. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3035 The host is installed with PHP 5.2.x through 5.2.14 and 5.3.x through 5.3.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a long email address string. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3036 The host is installed with PHP before 5.3.4 and is prone to multiple vulnerabilities. The flaws are present the application, which fails to properly handle non-shortest form UTF-8 encoding and ill-formed subsequences in UTF-8 data. Successful exploitation could allow attackers to bypass cross-site s ... oval:org.secpod.oval:def:3039 The host is installed with PHP 5.3.x through 5.3.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a crafted filename length. Successful exploitation could allow attackers to bypass security. oval:org.secpod.oval:def:3030 The host is installed with Apple Mac OS X 10.5.8 or 10.6 through 10.6.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an unspecified integer field in an NFS RPC packet. Successful exploitation could allow attackers to crash th ... oval:org.secpod.oval:def:3044 The host is installed with Apple QuickTime and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a specially crafted QTVR (QuickTime Virtual Reality) movie file. Successful exploitation allow remote attackers to execute arbitrary code o ... oval:org.secpod.oval:def:3045 The host is installed with Ruby 1.9.2-p136 and earlier and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3042 The host is installed with Apple QuickTime and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to properly handle a specially crafted movie file. Successful exploitation allow remote attackers to execute arbitrary code or cause a denial of service (appli ... oval:org.secpod.oval:def:3043 The host is installed with Apple QuickTime and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a specially crafted flashpix file. Successful exploitation allow remote attackers to execute arbitrary code or cause a denial of service (a ... oval:org.secpod.oval:def:3048 The host is installed with Mac OS X 10.5.8 or 10.6 through 10.6.6 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted SHZ bytecode instruction. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3049 The host is installed with FreeType 2.4.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle ft_var readpackedpoints function. Successful exploitation could allow attackers to cause buffer overflow. oval:org.secpod.oval:def:3046 The host is installed with Apache HTTP Server as distributed in Apache Subversion 1.5.x before 1.5.8 and 1.6.x before 1.6.13 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a named repository as a rule scope. Successful exploitation could ... oval:org.secpod.oval:def:3047 The host is installed with Apple Mac OS X 10.6 through 10.6.6 and is prone to man-in-the-middle attack. A flaw is present in the application, which fails to prevent leveraging protocol vulnerabilities. Successful exploitation could allow attackers to spoof SSH servers. oval:org.secpod.oval:def:3040 The host is installed Quicklook in Apple Mac OS X 10.6 through 10.6.6 and is prone to a denial of service vulnerability. A flaw is present in the application, that fials to handle an Excel spreadsheet with a crafted formula that uses unspecified opcodes. Successful exploitation could allow attackers ... oval:org.secpod.oval:def:3041 The host is installed with QuickTime in Apple Mac OS X 10.6 through 10.6.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted JPEG2000 image. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3011 The host is installed with Apple Mac OS X 10.6 through 10.6.6 and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to handle a document that contains a crafted embedded Type 1 font. Successful exploitation could allow attackers to execute ar ... oval:org.secpod.oval:def:3012 The host is installed with Apple Mac OS X 10.6 through 10.6.6 and is prone to multiple buffer overflow vulnerabilities. A flaw is present in the application, which fails to handle a document that contains a crafted SFNT table in an embedded font. Successful exploitation could allow attackers to exec ... oval:org.secpod.oval:def:3010 The host is installed with Apple Mac OS X and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to handle a document that contains a crafted embedded TrueType font. Successful exploitation could allow attackers to cause multiple buffer overfl ... oval:org.secpod.oval:def:3013 The host is installed with bzip2 and libbzip2 before 1.0.6 and is pone to an integer overflow vulnerability. A flaw is present in the applications, which fails to handle a crafted compressed file. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3014 The host is installed with Apple Mac OS X 10.6 through 10.6.6 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a call with the kTemporaryFolderType flag. Successful exploitation could allow attackers to disclose sensitive informatio ... oval:org.secpod.oval:def:3019 The host is installed with Apple Mac OS X 10.6 through 10.6.6 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle a document that contains a crafted embedded font. Successful exploitation could allow attackers to execute arbitrary code o ... oval:org.secpod.oval:def:3022 The host is installed with Apple Mac OS X 10.6 through 10.6.6 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted TIFF image with JPEG encoding. oval:org.secpod.oval:def:3023 The host is installed with Apple Mac OS X 10.6 through 10.6.6 and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the applications, which fails to handle a crafted Canon RAW image. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3020 The host is installed with Apple Mac OS X 10.6 through 10.6.6 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to read arbitrary (1) HFS, (2) HFS+, or (3) HFS+J files. Successful exploitation could allow attackers to read arbitrary data. oval:org.secpod.oval:def:3021 The host is installed with Apple Mac OS X 10.5.8 or 10.6 through 10.6.6 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted XBM image. Successful exploitation could allow attackers to execute arbitrary code or crash the service. oval:org.secpod.oval:def:3026 The host is installed with MIT Kerberos 5 1.7.x and is prone to multiple remote security bypass vulnerabilities. Multiple flaws are present in the application, which fails to properly handle unkeyed checksums. Successful exploitation could allow remote attackers to forge GSS tokens, gain privileges, ... oval:org.secpod.oval:def:3027 The host is installed with MIT Kerberos 5 (aka krb5) 1.8.x through 1.8.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to reject RC4 key-derivation checksums. Successful exploitation could allow attackers to bypass security. oval:org.secpod.oval:def:3024 The host is installed with Apple Mac OS X 10.6 through 10.6.6 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a URL processing issue in Install Helper. Successful exploitation could allow attackers to track user logins. oval:org.secpod.oval:def:3025 The host is installed with Apple Mac OS X 10.5.8 or 10.6 through 10.6.6 and is prone to multiple cryptographic issues. The flaws are present in the application, which do not properly determine the acceptability of checksums. Successful exploitation could allow attackers to bypass security. oval:org.secpod.oval:def:3028 The host is installed with MIT Kerberos 5 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle 'KrbFastReq' forgery issue. Successful exploitation could allow attackers to bypass security. oval:org.secpod.oval:def:3029 The host is installed with Apple Mac OS X 10.6 through 10.6.6 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which does not properly handle call gates. Successful exploitation could allow attackers to gain privileges. oval:org.secpod.oval:def:3005 The host is installed with Mac OS X 10.6 through 10.6.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a divide by zero error. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3008 The host is installed with Mac OS X 10.6 through 10.6.6 and is prone to multiple format string vulnerabilities. A flaw is present in the application, which fails to handle format string specifiers. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3009 The host is installed with Apple Mac OS X 10.6.0 through 10.6.6 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application which fails to handle open type fonts. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:3006 The host is installed with Apache HTTP Server 2.2.x before 2.2.16 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a request that lacks path. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3007 Th host is installed with Apache HTTP Server 2.2.9 through 2.2.15, 2.3.4-alpha, and 2.3.5-alpha on OS/2 and is prone to a denial of service vulnerability. A flaw is present in certain configurations involving proxy worker pools, which does not properly detect timeouts, which allows remote attackers ... oval:org.secpod.oval:def:3925 The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a use-after-free vulnerability. A flaw is present in the application, which uses the same variable for multiple arguments. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:21726 The host is installed with Apple Mac OS X or Server 10.10.x before 10.10.2 and is prone to information disclosure vulnerability. A flaw is present in the application, which does not properly clear the browsing cache upon a transition out of private-browsing mode. Successful exploitation allows attac ... oval:org.secpod.oval:def:21722 The host is missing a security update according to Apple advisory, APPLE-SA-2014-11-17-2. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle certain vectors. Successful exploitation allows attackers to execute remote code or obtain ... oval:org.secpod.oval:def:21769 The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a web site that triggers an uncaught SafariNotificationAgent exception by providing a crafted Push Notification. Su ... oval:org.secpod.oval:def:21767 The host is installed with Apple Mac OS X or Server before 10.10 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an application that makes crafted IOKit function calls. Successful exploitation allows attackers to obtain se ... oval:org.secpod.oval:def:21768 The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted call. Successful exploitation allows attackers to cause a denial of service (out-of-bounds read and devic ... oval:org.secpod.oval:def:21763 The host is installed with Apple Mac OS X or Server before 10.10 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle an application that provides crafted values in unspecified metadata fields. Successful exploitation allows ... oval:org.secpod.oval:def:21764 The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not properly handle incomplete resource envelopes in signed bundles. Successful exploitation allows attackers to bypass intended app-auth ... oval:org.secpod.oval:def:21772 The host is installed with Apple Mac OS X or Server 10.9.5 or earlier and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle an unspecified command to one interface. Successful exploitation allows attackers to discover the network addresses of al ... oval:org.secpod.oval:def:21773 The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle the accessibility API. Successful exploitation allows attackers to bypass a sandbox protection mechanism. oval:org.secpod.oval:def:21770 The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a user-space process to observe data related to the random numbers. Successful exploitation allows attackers to bypas ... oval:org.secpod.oval:def:21771 The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not properly enforce the "require password after sleep or screen saver begins" setting. Successful exploitation allows attackers to obtai ... oval:org.secpod.oval:def:21758 The host is installed with Apple Mac OS X or Server 10.8, 10.9 or before 10.10.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to obtain sensitive memory-co ... oval:org.secpod.oval:def:21759 The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to cause a denial of service (NULL pointer derefere ... oval:org.secpod.oval:def:21756 The host is installed with Apple Mac OS X or Server 10.8, 10.9 or before 10.10.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to obtain sensitive memory-co ... oval:org.secpod.oval:def:21757 The host is installed with Apple Mac OS X or Server 10.8, 10.9 or before 10.10.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to obtain sensitive memory-co ... oval:org.secpod.oval:def:21754 The host is installed with Apple Mac OS X or Server before 10.10 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted Wi-Fi AP. Successful exploitation allows attackers to calculate credentials by offering LEAP authen ... oval:org.secpod.oval:def:21755 The host is installed with Apple Mac OS X or Server before 10.10.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to obtain sensitive memory-content and memo ... oval:org.secpod.oval:def:21752 The host is installed with Xcode before 7.0 on Apple Mac OS X 10.10.4 or later, Apple Mac OS X or Server 10.8.5 or OS X 10.9 through 10.9.4 or 10.10.x before 10.10.2 and is prone to a man-in-the-middle vulnerability. A flaw is present in the application, which fails to properly handle a padding-orac ... oval:org.secpod.oval:def:21753 The host is installed with Apple Mac OS X or Server before 10.10 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle crafted audio samples in an m4a file. Successful exploitation allows attackers to execute arbitrary code or ... oval:org.secpod.oval:def:21762 The host is installed with Apple Mac OS X or Server before 10.10 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle an application that provides crafted values in unspecified metadata fields. Successful exploitation allows ... oval:org.secpod.oval:def:21760 The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a double free vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Mach ports. Successful exploitation allows attackers to gain privileges or cause a denial of service ( ... oval:org.secpod.oval:def:21747 The host is installed with Apple Mac OS X or Server 10.9.5 or earlier and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle crafted ICMPv6 packets. Successful exploitation allows attackers to denial of service (CPU consumption). oval:org.secpod.oval:def:21748 The host is installed with Apple Mac OS X or Server before 10.10 and is prone to an information disclosure vulnerability. A flaw is present in the application, which does not clear the back/forward history of an open tab. Successful exploitation allows attackers to obtain sensitive information. oval:org.secpod.oval:def:21746 The host is missing a security update according to Apple advisory, APPLE-SA-2014-10-16-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle certain vectors. Successful exploitation allows attackers to determine all the network add ... oval:org.secpod.oval:def:21749 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9 through 10.9.5 or 10.10 before 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the apache, which fails to properly handle a crafted DAV WRITE request. Successful exploitation allows attackers to cause a ... oval:org.secpod.oval:def:21750 The host is installed with Apple Mac OS X or Server before 10.8.5, 10.9.x before 10.9.5 or 10.10 before 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted cookie. Successful exploitation allows attackers to cause ... oval:org.secpod.oval:def:21751 The host is installed with Apple Mac OS X or Server before 10.10 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a symlink attack. Successful exploitation allows attackers to execute arbitrary code with system privileges ... oval:org.secpod.oval:def:26625 The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which does not properly prevent entity expansion even when entity substitution has been disabled. Successful exploitation all ... oval:org.secpod.oval:def:21789 The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not ensure that a Kerberos ticket is in the cache for the correct user. Successful exploitation allows attackers to gain privileges in op ... oval:org.secpod.oval:def:21787 The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a message to a system control socket. Successful exploitation allows attackers to cause a denial of service (panic). oval:org.secpod.oval:def:21788 The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted ASN.1 data. Successful exploitation allows attackers to cause a denial of service (NULL pointer dereference). oval:org.secpod.oval:def:21785 The host is installed with Apple Mac OS X or Server before 10.10 and is prone to an information disclosure vulnerability. A flaw is present in the application, which leverages access to an unintended proxy server. Successful exploitation allows attackers to obtain sensitive information in opportunis ... oval:org.secpod.oval:def:21786 The host is installed with Apple Mac OS X or Server before 10.10 and is prone to an information disclosure vulnerability. A flaw is present in the application, which does not ensure that the disabling of File Sharing is always possible. Successful exploitation allows attackers to read or write to fi ... oval:org.secpod.oval:def:21778 The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted resource forks in an HFS filesystem. Successful exploitation allows attackers to execute arbitrary ... oval:org.secpod.oval:def:21779 The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle crafted filename on an HFS filesystem. Successful exploitation allows attackers to cause a denial of service (NULL ... oval:org.secpod.oval:def:21776 The host is installed with Apple Mac OS X or Server before 10.10 and is prone to an information disclosure vulnerability. A flaw is present in the application, which does not properly manage the screen-lock state. Successful exploitation allows attackers to view windows. oval:org.secpod.oval:def:21777 The host is installed with Apple Mac OS X or Server before 10.10 and is prone to an information disclosure vulnerability. A flaw is present in the application, which does not properly display the encryption status in between a setting-update action and a reboot action. Successful exploitation allows ... oval:org.secpod.oval:def:21774 The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not require encryption for HID Low Energy devices. Successful exploitation allows attackers to spoof a device. oval:org.secpod.oval:def:21775 The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a remount. Successful exploitation allows attackers to obtain cleartext data. oval:org.secpod.oval:def:21783 The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle an unattended workstation on which screen locking had been attempted. Successful exploitation allows attackers to obtain acces ... oval:org.secpod.oval:def:21784 The host is installed with Apple Mac OS X or Server before 10.10 and is prone to an information disclosure vulnerability. A flaw is present in the application, which does not properly recognize the removal of a recipient address from a message. Successful exploitation allows attackers to obtain sens ... oval:org.secpod.oval:def:21781 The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted application. Successful exploitation allows attackers to cause denial of service (out-of-bounds read operation). oval:org.secpod.oval:def:21782 The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle an application that specifies a crafted handler for the Content-Type field of an object. Successful exploitation allows attack ... oval:org.secpod.oval:def:21780 The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not properly enforce rate limiting of lost-mode PIN entry. Successful exploitation allows attackers to obtain access. oval:org.secpod.oval:def:26700 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not properly check environment variables for the env_delete restriction. Successful exploitation allows local users with sudo ... oval:org.secpod.oval:def:21173 The host is installed with Xcode before 6.0.1 on Apple Mac OS X 10.9.4 or later and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle malicious data when SVNListParentPath was enabled. Successful exploitation could allow attackers to crash the ... oval:org.secpod.oval:def:21259 The host is installed with Apple Mac OS X or Server 10.7.5, OS X 10.8.5 or OS X 10.9 through 10.9.4 and is prone to buffer overflow vulnerability. The flaws is present in the application, which fails to properly handle MIDI files. Successful exploitation may lead to an unexpected application termina ... oval:org.secpod.oval:def:21257 The host is installed with Apple Mac OS X or Server 10.7.5, OS X 10.8.5 or OS X 10.9 through 10.9.4 and is prone to multiple vulnerabilities. The flaws are present in the application, which does not ensure that certain swap operations have a constant-time behavior. Successful exploitation may lead t ... oval:org.secpod.oval:def:21258 The host is installed with Apple Mac OS X or Server 10.7.5, OS X 10.8.5 or OS X 10.9 through 10.9.4 and is prone to denial of service vulnerability. The flaw is present in the application, which fails to properly handle a crafted movie file with RLE encoding. Successful exploitation allows remote at ... oval:org.secpod.oval:def:21260 The host is installed with Apple Mac OS X or Server 10.7.5, OS X 10.8.5 or OS X 10.9 through 10.9.4 and is prone to denial of service vulnerability. The flaw is present in the application, which fails to properly handle a malformed version number and flags in an mvhd atom. Successful exploitation ma ... oval:org.secpod.oval:def:21261 The host is installed with Apple Mac OS X or Server 10.9 through 10.9.4 and is prone to heap buffer overflow vulnerability. The flaw is present in the application, which fails to properly handle percent-encoded characters in a URI. Successful exploitation allows remote attacker may be able to cause ... oval:org.secpod.oval:def:21248 The host is installed with Apple Mac OS X or Server 10.8.5 or OS X 10.9 through 10.9.4 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to bypass the ASLR protection mec ... oval:org.secpod.oval:def:21249 The host is installed with Apple Mac OS X or Server 10.8.5 or OS X 10.9 through 10.9.4 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle an application that provides crafted values in unspecified metadata fields. Successful e ... oval:org.secpod.oval:def:21246 The host is installed with Apple Mac OS X or Server 10.8.5 or OS X 10.9 through 10.9.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle an application that provides crafted API arguments. Successful exploitation allows attackers to ... oval:org.secpod.oval:def:21247 The host is installed with Apple Mac OS X or Server 10.9 through 10.9.4 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to execute arbitrary code in a privileg ... oval:org.secpod.oval:def:21255 The host is installed with Apple Mac OS X or Server 10.7.5, OS X 10.8.5 or OS X 10.9 through 10.9.4 and is prone to multiple vulnerabilities. The flaws are present in the application, which does not ensure that certain swap operations have a constant-time behavior. Successful exploitation may lead t ... oval:org.secpod.oval:def:21253 The host is installed with Apple Mac OS X or Server 10.7.5, OS X 10.8.5 or OS X 10.9 through 10.9.4 and is prone to multiple vulnerabilities. The flaws are present in the application, which does not ensure that certain swap operations have a constant-time behavior. Successful exploitation may lead t ... oval:org.secpod.oval:def:21254 The host is installed with Apple Mac OS X or Server 10.7.5, OS X 10.8.5 or OS X 10.9 through 10.9.4 and is prone to multiple vulnerabilities. The flaws are present in the application, which does not ensure that certain swap operations have a constant-time behavior. Successful exploitation may lead t ... oval:org.secpod.oval:def:21251 The host is installed with Apple Mac OS X or Server 10.9 through 10.9.4 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly handle kernel addresses. Successful exploitation allows local users to obtain sensitive address information and bypass ... oval:org.secpod.oval:def:21252 The host is installed with Apple Mac OS X or Server 10.8.5 or OS X 10.9 through 10.9.4 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to execute arbitrary cod ... oval:org.secpod.oval:def:21250 The host is installed with Apple Mac OS X or Server 10.8.5 or OS X 10.9 through 10.9.4 or 10.10.x before 10.10.2 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle an application that provides crafted values in unspecified met ... oval:org.secpod.oval:def:21239 The host is installed with Apple Mac OS X or Server 10.8.5 or OS X 10.9 through 10.9.4 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to execute arbitrary cod ... oval:org.secpod.oval:def:21237 The host is installed with Apple Mac OS X or Server 10.8.5 or OS X 10.9 through 10.9.4 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to execute arbitrary cod ... oval:org.secpod.oval:def:21238 The host is installed with Apple Mac OS X or Server 10.8.5 or OS X 10.9 through 10.9.4 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to execute arbitrary cod ... oval:org.secpod.oval:def:21235 The host is installed with Apple Mac OS X or Server 10.9 through 10.9.4 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to properly handle XML data containing an external entity declaration . Successful exploitation allows attackers to read arb ... oval:org.secpod.oval:def:21236 The host is installed with Apple Mac OS X or Server 10.8.5 or OS X 10.9 through 10.9.4 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted GLSL shader. Successful exploitation allows remote attackers to execute arbitrary code ... oval:org.secpod.oval:def:21244 The host is installed with Apple Mac OS X or Server 10.8.5 or OS X 10.9 through 10.9.4 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to execute arbitrary cod ... oval:org.secpod.oval:def:21245 The host is installed with Apple Mac OS X or Server 10.8.5 or OS X 10.9 through 10.9.4 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to execute arbitrary cod ... oval:org.secpod.oval:def:21242 The host is installed with Apple Mac OS X or Server 10.8.5 or OS X 10.9 through 10.9.4 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to execute arbitrary cod ... oval:org.secpod.oval:def:21243 The host is installed with Apple Mac OS X or Server 10.8.5 or OS X 10.9 through 10.9.4 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to execute arbitrary cod ... oval:org.secpod.oval:def:21240 The host is installed with Apple Mac OS X or Server 10.8.5 or OS X 10.9 through 10.9.4 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to execute arbitrary cod ... oval:org.secpod.oval:def:21241 The host is installed with Apple Mac OS X or Server 10.8.5 or OS X 10.9 through 10.9.4 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to execute arbitrary cod ... oval:org.secpod.oval:def:21228 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9 through 10.9.5 or 10.10 before 10.10.3 and is prone to a denial of service vulnerability. The flaws are present in the application, which fails to properly handle a crafted CDF file. Successful exploitation allows attackers to crash th ... oval:org.secpod.oval:def:21229 The host is installed with Apple Mac OS X or Server 10.9 through 10.9.4 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted ASCII file that triggers a large amount of backtracking. Successful exploitation allows attackers to ex ... oval:org.secpod.oval:def:21226 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9 through 10.9.5 or 10.10 before 10.10.3 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted ASCII file that triggers a large amount of backtracking. Successful exp ... oval:org.secpod.oval:def:21227 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9 through 10.9.5 or 10.10 before 10.10.3 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted ASCII file that triggers a large amount of backtracking. Successful exp ... oval:org.secpod.oval:def:21224 The host is installed with Apple Mac OS X or Server 10.9 through 10.9.4 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted ASCII file that triggers a large amount of backtracking. Successful exploitation allows attackers to ex ... oval:org.secpod.oval:def:21225 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9 through 10.9.5 or 10.10 before 10.10.3 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted ASCII file that triggers a large amount of backtracking. Successful exp ... oval:org.secpod.oval:def:21233 The host is installed with Apple Mac OS X or Server 10.9 through 10.9.4 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted PDF document. Successful exploitation allows remote attackers to obtain sensitive information o ... oval:org.secpod.oval:def:21234 The host is installed with Apple Mac OS X or Server 10.7.5, 10.8.5 or 10.9 through 10.9.4 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted PDF document. Successful exploitation allows remote attackers to obtain sensitive i ... oval:org.secpod.oval:def:21231 The host is installed with with Apple Mac OS X or Server 10.8.5, 10.9 through 10.9.5 or 10.10 before 10.10.3 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted ASCII file that triggers a large amount of backtracking. Successfu ... oval:org.secpod.oval:def:21232 The host is installed with Apple Mac OS X or Server 10.9 through 10.9.4 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which does not properly validate API calls. Successful exploitation allows attackers to execute arbitrary code in a privileged context ... oval:org.secpod.oval:def:21218 The host is installed with Apple Mac OS X or Server 10.9 through 10.9.4 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted ASCII file that triggers a large amount of backtracking. Successful exploitation allows attackers to ex ... oval:org.secpod.oval:def:21222 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9 through 10.9.5 or 10.10 before 10.10.3 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted ASCII file that triggers a large amount of backtracking. Successful exp ... oval:org.secpod.oval:def:21223 The host is installed with Apple Mac OS X or Server 10.9 through 10.9.4 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted ASCII file that triggers a large amount of backtracking. Successful exploitation allows attackers to ex ... oval:org.secpod.oval:def:21220 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9 through 10.9.5 or 10.10 before 10.10.3 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted ASCII file that triggers a large amount of backtracking. Successful exp ... oval:org.secpod.oval:def:21221 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9 through 10.9.5 or 10.10 before 10.10.3 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted ASCII file that triggers a large amount of backtracking. Successful exp ... oval:org.secpod.oval:def:39596 The host is installed with Apple Mac OS X 10.8 before 10.13 and is prone to a http request redirection vulnerability. A flaw is present in the application, which fails to properly handle a malicious HTTP request. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:3913 The host is installed with Apple Mac OS X 10.6.8, 10.7.x before 10.7.3, 10.9.5, 10.10.5 or 10.11.x before 10.11.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted LZW stream and a crafted compressed stream. Successful e ... oval:org.secpod.oval:def:21765 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9 through 10.9.5 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle an application that provides crafted key-mapping properties. Successful exploitation allows ... oval:org.secpod.oval:def:21766 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9 through 10.9.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an application that provides crafted key-mapping properties. Successful exploitation allows attacker ... oval:org.secpod.oval:def:21761 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9 through 10.9.5 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to execute arbitrary code in ... oval:org.secpod.oval:def:26584 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data. Successful exploi ... oval:org.secpod.oval:def:26583 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted length field in ASN1_TIME data. Successful exploitation allows attackers to cause a d ... oval:org.secpod.oval:def:37336 The host is installed with Apple Mac OS X 10.8 before 10.13 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle libarchive. Successful exploitation could allow remote attackers to corrupt memory. oval:org.secpod.oval:def:26683 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a long and duplicative list in the ssh -oKbdInteractiveDevices option. Successful exploitation allows remote atta ... oval:org.secpod.oval:def:21256 The host is installed with Apple Mac OS X or Server 10.7.5, OS X 10.8.5 or OS X 10.9 through 10.9.4 and is prone to multiple vulnerabilities. The flaws are present in the application, which does not ensure that certain swap operations have a constant-time behavior. Successful exploitation may lead t ... oval:org.secpod.oval:def:21230 The host is installed with Apple Mac OS X or Server 10.9 through 10.9.4 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted ASCII file that triggers a large amount of backtracking. Successful exploitation allows attackers to ex ... oval:org.secpod.oval:def:10716 The host is installed with Mac OS X 10.6.8 or 10.7 before 10.7.5 or 10.8.x before 10.8.2 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted tar file. Successful exploitation allows remote attackers to cause a denial of service or pos ... oval:org.secpod.oval:def:10713 The host is installed with Mac OS X 10.6.8 or 10.7 before 10.7.5 or 10.8.x before 10.8.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle query strings that lack an = (equals sign). Successful exploitation could allow att ... oval:org.secpod.oval:def:10715 The host is installed with Mac OS X 10.6.8 or 10.7 before 10.7.5 or 10.8.x before 10.8.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle query strings that contain a %3D sequence but no = (equals sign) character. Success ... oval:org.secpod.oval:def:74187 The host is installed with Apple Mac OS 11.5, Mac OS X 10.14.6 or 10.15.7 and is prone to an multiple vulnerability. A flaw is present in the application, which fails to properly handle memory handling issue. On successful exploitation, processing maliciously crafted web content may lead to arbitrar ... oval:org.secpod.oval:def:77527 The host is installed with Apple Mac OS 12 before 12.2 or Apple Safari before 15.3 on Apple Mac OS 10.15.7 or Apple Mac OS 11 and is prone to a logic vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. On successful exploitation, processing m ... oval:org.secpod.oval:def:77526 The host is installed with Apple Mac OS 12 before 12.2 or Apple Safari before 15.3 on Apple Mac OS 10.15.7 or Apple Mac OS 11 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to properly handle a memory management issue. On successful exploitation, pr ... oval:org.secpod.oval:def:34668 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute a ... oval:org.secpod.oval:def:37337 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted web content. Successful exploitation could allow remote attackers to execute arbitrary code. oval:org.secpod.oval:def:50299 The host is installed with Apple Mac OS X 10.14.2 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to execute arbitrary code through a maliciously ... oval:org.secpod.oval:def:50301 The host is installed with Apple Mac OS X 10.14.2 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to execute arbitrary code through a maliciously ... oval:org.secpod.oval:def:53569 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle an issue in perl. Successful exploitation allows an attacker to cause unspecified impact. oval:org.secpod.oval:def:53568 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle an issue in perl. Successful exploitation allows an attacker to cause unspecified impact. oval:org.secpod.oval:def:37825 The host is installed with Apple Safari before 10.0.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle malicious crafted web content. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:37824 The host is installed with Apple Safari before 10.0.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle malicious crafted web content. Successful exploitation could allow attackers to disclose user information. oval:org.secpod.oval:def:37308 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code. oval:org.secpod.oval:def:37355 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code. oval:org.secpod.oval:def:37319 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle deletion of Local Storage. Successful exploitation could allow remote attackers to cause information leak. oval:org.secpod.oval:def:36963 The host is installed with Apple Safari before 9.1.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:36962 The host is missing a security update according to Apple advisory, APPLE-SA-2016-09-01-1. The update is required to fix a memory corruption vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary c ... oval:org.secpod.oval:def:44840 The host is installed with Apple Mac OS X 10.11.6 or 10.12.6 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle bounds checking. Successful exploitation leads to integer overflow. oval:org.secpod.oval:def:44812 The host is installed with Apple Safari before 11.1 and is prone to a memory corrpution vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:44813 The host is installed with Apple Safari before 11.1 and is prone to a memory corrpution vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:44814 The host is installed with Apple Safari before 11.1 and is prone to a memory corrpution vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:44815 The host is installed with Apple Safari before 11.1 and is prone to a memory corrpution vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:44811 The host is installed with Apple Safari before 11.1 and is prone to a memory corrupution vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:44817 The host is installed with Apple Safari before 11.1 and is prone to a memory corrpution vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:44818 The host is installed with Apple Safari before 11.1 and is prone to a memory corrpution vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:44819 The host is installed with Apple Safari before 11.1 and is prone to a memory corrpution vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:44823 The host is installed with Apple Safari before 11.1 and is prone to a memory corrpution vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:44824 The host is installed with Apple Safari before 11.1 and is prone to a memory corrpution vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:44825 The host is installed with Apple Safari before 11.1 and is prone to a memory corrpution vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:44826 The host is installed with Apple Safari before 11.1 and is prone to a memory corrpution vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:44820 The host is installed with Apple Safari before 11.1 and is prone to a memory corrpution vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:44821 The host is installed with Apple Safari before 11.1 and is prone to a memory corrpution vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:44827 The host is installed with Apple Safari before 11.1 and is prone to an unspecified vulnerability. An array indexing issue existed in the handling of a function in javascript core. Successful exploitation may lead to an ASSERT failure. oval:org.secpod.oval:def:44828 The host is installed with Apple Safari before 11.1 and is prone to a cross-site script vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to a cross-site scripting attack. oval:org.secpod.oval:def:44829 The host is installed with Apple Safari before 11.1 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fails to properly handle a maliciously crafted web content. Successful exploitation may lead to a denial of service. oval:org.secpod.oval:def:44830 The host is installed with Apple Safari before 11.1 or Google Chrome before 68.0.3440.75 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fails to properly handle a maliciously crafted web content. Successful exploitation may lead to a denial of service ... oval:org.secpod.oval:def:44831 The host is missing a security update according to Apple advisory, APPLE-SA-2018-3-29-6. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to disclose sensi ... oval:org.secpod.oval:def:45306 The host is installed with Apple Safari before 11.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications, which fails to properly handle a memory corruption issue. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:45933 The host is installed with Apple Safari before 11.1.1 and is prone to a cookie-poisoning vulnerability. A flaw is present in the applications, which fails to properly handle issues in web-browser cookies. Successful exploitation may lead to cookies being overwritten. oval:org.secpod.oval:def:45938 The host is installed with Apple Safari before 11.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications, which fails to properly handle buffer overflow issues. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:45939 The host is installed with Apple Safari before 11.1.1 and is prone to an information disclosure vulnerability. A flaw is present in the applications, which fails to properly handle issues in fetching CSS mask images. Successful exploitation may lead to leak sensitive data. oval:org.secpod.oval:def:45940 The host is installed with Apple Safari before 11.1.1 and is prone to a arbitrary code execution vulnerability. A flaw is present in the applications, which fails to properly handle out-of-bounds read issues. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:45942 The host is installed with Apple Safari before 11.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications, which fails to properly handle memory issues. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:45943 The host is installed with Apple Safari before 11.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications, which fails to properly handle memory issues. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:53567 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle an issue in perl. Successful exploitation allows an attacker to cause unspecified impact. oval:org.secpod.oval:def:45901 The host is installed with Apple Mac OS X 10.13.4 and is prone to a stack buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle php version less than 7.1.16. Successful exploitation allows attackers to execute arbitrary code in the context of the affecte ... oval:org.secpod.oval:def:46309 The host is installed with Apple Safari before 11.1.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows attackers to cause a denial of service. oval:org.secpod.oval:def:46308 The host is installed with Apple Safari before 11.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted web content. Successful exploitation allows attackers to lead to arbitrary code execution. oval:org.secpod.oval:def:46304 The host is missing a security update according to Apple advisory, APPLE-SA-2018-7-9-5. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle a malicious website. Successful exploitation could allow attackers to spoof address bars or ... oval:org.secpod.oval:def:46307 The host is installed with Apple Safari before 11.1.2 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle a malicious website. Successful exploitation allows attackers to exfiltrate cross-origin the sound fetched through audio elements. oval:org.secpod.oval:def:46306 The host is installed with Apple Safari before 11.1.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a malicious website. Successful exploitation allows attackers to cause an unexpected Safari crash. oval:org.secpod.oval:def:46312 The host is installed with Apple Safari before 11.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows attackers to lead to arbitrary code execution. oval:org.secpod.oval:def:46311 The host is installed with Apple Safari before 11.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows attackers to lead to arbitrary code execution. oval:org.secpod.oval:def:46314 The host is installed with Apple Safari before 11.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows attackers to lead to arbitrary code execution. oval:org.secpod.oval:def:46313 The host is installed with Apple Safari before 11.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows attackers to lead to arbitrary code execution. oval:org.secpod.oval:def:46310 The host is installed with Apple Safari before 11.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows attackers to lead to arbitrary code execution. oval:org.secpod.oval:def:46316 The host is installed with Apple Safari before 11.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows attackers to lead to arbitrary code execution. oval:org.secpod.oval:def:46315 The host is installed with Apple Safari before 11.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. Successful exploitation allows attackers to lead to arbitrary code execution. oval:org.secpod.oval:def:46318 The host is installed with Apple Safari before 11.1.2 and is prone to a multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle a maliciously crafted web content. Successful exploitation allows attackers to cause an unexpected Safari crash ... oval:org.secpod.oval:def:45934 The host is installed with Apple Safari before 11.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications, which fails to properly handle maliciously crafted web content. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:59001 The host is installed with Apple MacOS X 10.13.6, 10.14.6 and before 10.13 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle multiple issues in PHP. Successful exploitation could allow attackers to cause a denial of servi ... oval:org.secpod.oval:def:59002 The host is installed with Apple MacOS X 10.13.6, 10.14.6 and before 10.13 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle multiple issues in PHP. Successful exploitation could allow attackers to cause a denial of servi ... oval:org.secpod.oval:def:59984 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues. oval:org.secpod.oval:def:59985 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues. oval:org.secpod.oval:def:59986 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues. oval:org.secpod.oval:def:59987 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues. oval:org.secpod.oval:def:59980 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues. oval:org.secpod.oval:def:59981 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues. oval:org.secpod.oval:def:59982 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues. oval:org.secpod.oval:def:59983 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues. oval:org.secpod.oval:def:59977 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues. oval:org.secpod.oval:def:59978 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues. oval:org.secpod.oval:def:59979 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues. oval:org.secpod.oval:def:59990 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues. oval:org.secpod.oval:def:59995 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues. oval:org.secpod.oval:def:59991 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues. oval:org.secpod.oval:def:59992 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues. oval:org.secpod.oval:def:59994 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues. oval:org.secpod.oval:def:59988 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues. oval:org.secpod.oval:def:59989 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues. oval:org.secpod.oval:def:59973 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues. oval:org.secpod.oval:def:59974 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues. oval:org.secpod.oval:def:59975 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues. oval:org.secpod.oval:def:59976 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues. oval:org.secpod.oval:def:59971 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues. oval:org.secpod.oval:def:59972 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues. oval:org.secpod.oval:def:26611 The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.4 and is prone to a HTTP request smuggling vulnerability. A flaw is present in the application, which fails to handle a crafted request. Successful exploitation allows attackers to conduct HTTP request smuggling atta ... oval:org.secpod.oval:def:34617 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to cause unspecified impact. oval:org.secpod.oval:def:34682 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to cause unspecified impact. oval:org.secpod.oval:def:34681 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to cause unspecified impact. oval:org.secpod.oval:def:34679 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to cause unspecified impact. oval:org.secpod.oval:def:34678 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to cause unspecified impact. oval:org.secpod.oval:def:39710 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a t2p_process_jpeg_strip heap buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39711 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39712 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39713 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39714 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a cpStripToTile heap-buffer-overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39708 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a heap buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39709 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a predictor heap buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:37359 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected application termination or arbitrary code execut ... oval:org.secpod.oval:def:37358 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected application termination or arbitrary code execut ... oval:org.secpod.oval:def:37356 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected application termination or arbitrary code execut ... oval:org.secpod.oval:def:37361 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected application termination or arbitrary code execut ... oval:org.secpod.oval:def:37369 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected application termination or arbitrary code execut ... oval:org.secpod.oval:def:37367 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected application termination or arbitrary code execut ... oval:org.secpod.oval:def:16067 The host is installed with Mono Framework before 4.8.1, Google Chrome before 31.0.1650.48, Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2 or SeaMonkey before 2.23 and is prone to an information disclosure vulnerability. The flaw is present in get_sos function in j ... oval:org.secpod.oval:def:4280 The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to a cross-site request forgery vulnerability. A flaw is present in the application, which fails to handle requests that change settings. Successful exploitation could allow attackers to hijack the authentication of ... oval:org.secpod.oval:def:4282 The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle parameter values containing a % (percent) character without two subsequent hex characters. Successful exploitati ... oval:org.secpod.oval:def:48649 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a vulnerable code issue. Successful exploitation allows an attacker to execute arbitrary code with kernel privil ... oval:org.secpod.oval:def:48647 The host is installed with Apple Mac OS X through 10.12.6, 10.13.6 or before 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows an attacker to execute arbitrary code wi ... oval:org.secpod.oval:def:48648 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to gain elevated privileges. oval:org.secpod.oval:def:48656 The host is installed with Apple Mac OS X 10.12.6 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle a memory related issues. Successful exploitation allows an attacker to execute arbitrary code with system privileges. oval:org.secpod.oval:def:48657 The host is installed with Apple Mac OS X 10.12.6 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle a memory related issues. Successful exploitation allows an attacker to execute arbitrary code with system privileges. oval:org.secpod.oval:def:48654 The host is installed with Apple Mac OS X 10.12.6 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle a memory related issues. Successful exploitation allows an attacker to execute arbitrary code with system privileges. oval:org.secpod.oval:def:48655 The host is installed with Apple Mac OS X 10.12.6 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle a memory related issues. Successful exploitation allows an attacker to execute arbitrary code with system privileges. oval:org.secpod.oval:def:48652 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows an attacker to execute arbitrary code with kernel privile ... oval:org.secpod.oval:def:48653 The host is installed with Apple Mac OS X through 10.12.6, 10.13.6 10.14 or before 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows an attacker to execute arbitrary c ... oval:org.secpod.oval:def:48650 The host is installed with Apple Mac OS X through 10.13.6 or before 10.11.6 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an access issue. Successful exploitation allows an attacker to leak sensitive user information. oval:org.secpod.oval:def:48651 The host is installed with Apple Mac OS X through 10.12.6, 10.13.6 10.14 or before 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows an attacker to execute arbitrary c ... oval:org.secpod.oval:def:48658 The host is installed with Apple Mac OS X 10.12.6 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle a memory related issues. Successful exploitation allows an attacker to execute arbitrary code with system privileges. oval:org.secpod.oval:def:48659 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a memory initialization issue. Successful exploitation allows an attacker to read restricted memory. oval:org.secpod.oval:def:48660 The host is installed with Apple Mac OS X 10.14 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a size validation issue. Successful exploitation allows an attacker to execute arbitrary code with kernel privileges. oval:org.secpod.oval:def:48667 The host is installed with Apple Mac OS X 10.12.6 and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to properly handle a memory related issue. Successful exploitation may allow attackers to perform buffer overflow. oval:org.secpod.oval:def:48668 The host is installed with Apple Mac OS X 10.12.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues related to ruby. Successful exploitation may allow attackers to cause unexpected application termination or arbitrary code ... oval:org.secpod.oval:def:48666 The host is installed with Apple Mac OS X 10.13.6 or 10.14 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle speculative reads of system registers issue. Successful exploitation may allow unauthorized disclosure of system pa ... oval:org.secpod.oval:def:48663 The host is installed with Apple Mac OS X through 10.12.6, 10.13.6 or before 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows an attacker to execute arbitrary code wi ... oval:org.secpod.oval:def:48664 The host is installed with Apple Mac OS X through 10.12.6, 10.13.6 or before 10.11.6 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an access issue. Successful exploitation allows an attacker to circumvent sandbox restrictio ... oval:org.secpod.oval:def:48661 The host is installed with Apple Mac OS X through 10.12.6, 10.13.6 or before 10.11.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to cause a denial of service. oval:org.secpod.oval:def:48662 The host is installed with Apple Mac OS X 10.14 and is prone to a user interface spoofing vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. Successful exploitation allows an attacker to UI spoofing when processing a maliciously crafted mail ... oval:org.secpod.oval:def:48669 The host is installed with Apple Mac OS X 10.12.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues related to ruby. Successful exploitation may allow attackers to cause unexpected application termination or arbitrary code ... oval:org.secpod.oval:def:48670 The host is installed with Apple Mac OS X 10.12.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues related to ruby. Successful exploitation may allow attackers to cause unexpected application termination or arbitrary code ... oval:org.secpod.oval:def:48671 The host is installed with Apple Mac OS X 10.12.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues related to ruby. Successful exploitation may allow attackers to cause unexpected application termination or arbitrary code ... oval:org.secpod.oval:def:48678 The host is installed with Apple Mac OS X 10.12.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues related to ruby. Successful exploitation may allow attackers to cause unexpected application termination or arbitrary code ... oval:org.secpod.oval:def:48679 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to cause a denial of service. oval:org.secpod.oval:def:48676 The host is installed with Apple Mac OS X 10.12.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues related to ruby. Successful exploitation may allow attackers to cause unexpected application termination or arbitrary code ... oval:org.secpod.oval:def:48677 The host is installed with Apple Mac OS X 10.12.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues related to ruby. Successful exploitation may allow attackers to cause unexpected application termination or arbitrary code ... oval:org.secpod.oval:def:48674 The host is installed with Apple Mac OS X 10.12.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues related to ruby. Successful exploitation may allow attackers to cause unexpected application termination or arbitrary code ... oval:org.secpod.oval:def:48675 The host is installed with Apple Mac OS X 10.12.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues related to ruby. Successful exploitation may allow attackers to cause unexpected application termination or arbitrary code ... oval:org.secpod.oval:def:48672 The host is installed with Apple Mac OS X 10.12.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues related to ruby. Successful exploitation may allow attackers to cause unexpected application termination or arbitrary code ... oval:org.secpod.oval:def:48673 The host is installed with Apple Mac OS X 10.12.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues related to ruby. Successful exploitation may allow attackers to cause unexpected application termination or arbitrary code ... oval:org.secpod.oval:def:48681 The host is installed with Apple Mac OS X through 10.12.6, 10.13.6 or before 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to execute arbitr ... oval:org.secpod.oval:def:48682 The host is installed with Apple Mac OS X through 10.12.6, 10.13.6 or before 10.11.6 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle a bounds checking issue. Successful exploitation allows an attacker to read restricted memory ... oval:org.secpod.oval:def:48680 The host is installed with Apple Mac OS X through 10.12.6, 10.13.6 or before 10.11.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a checks issue. Successful exploitation allows an attacker to cause a denial of service. oval:org.secpod.oval:def:48683 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to perform a denial of service attack. oval:org.secpod.oval:def:48610 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or before 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows a local process to execute arbitrary code. oval:org.secpod.oval:def:48618 The host is installed with Apple Mac OS X through 10.12.6, 10.13.6 or before 10.11.6 and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues. Successful exploitation allows an attacker to obtain sensitive info ... oval:org.secpod.oval:def:48619 The host is installed with Apple Mac OS X through 10.12.6, 10.13.6 or before 10.11.6 and is prone to a memory corruption vulnerability. The flaw is present in the application, which fails to properly handle input validation issue. Successful exploitation allows an attacker to elevate privileges thro ... oval:org.secpod.oval:def:48616 The host is installed with Apple Mac OS X through 10.13.6 or before 10.11.6 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to read restricted memory through a ... oval:org.secpod.oval:def:48617 The host is installed with Apple Mac OS X through 10.12.6, 10.13.6 or before 10.11.6 and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues. Successful exploitation allows an attacker to obtain sensitive info ... oval:org.secpod.oval:def:48614 The host is installed with Apple Mac OS X through 10.12.6, 10.13.6 or before 10.11.6 and is prone to an input validation vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue in afpserver. Successful exploitation allows an attacker to attack AF ... oval:org.secpod.oval:def:48615 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14 and is prone to a memory corruption vulnerability. The flaws are present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to execute arbitrary code with system ... oval:org.secpod.oval:def:48623 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14 and is prone to a prime number weak encryption vulnerability. A flaw is present in the application, which fails to properly handle the method for determining prime numbers. Successful exploitation allows an attacker to exploit a wea ... oval:org.secpod.oval:def:48624 The host is installed with Apple Mac OS X through 10.12.6, 10.13.6 or before 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to elevate privileges thr ... oval:org.secpod.oval:def:48621 The host is installed with Apple Mac OS X through 10.12.6, 10.13.6 or before 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows an attacker to execute arbitrary code wi ... oval:org.secpod.oval:def:48622 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows an attacker to execute arbitrary code with system privile ... oval:org.secpod.oval:def:48620 The host is installed with Apple Mac OS X through 10.12.6, 10.13.6 or before 10.11.6 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle a bounds checking issue. Successful exploitation allows an attacker to read restricted memory ... oval:org.secpod.oval:def:48629 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allows an attacker to elevate privileges through a malicious applicati ... oval:org.secpod.oval:def:48627 The host is installed with Apple Mac OS X through 10.12.6, 10.13.6 or before 10.11.6 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to disclose user informati ... oval:org.secpod.oval:def:48628 The host is installed with Apple Mac OS X 10.14 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle additional entitlements. Successful exploitation allows an attacker to access restricted files. oval:org.secpod.oval:def:48625 The host is installed with Apple Mac OS X through 10.12.6, 10.13.6 or before 10.11.6 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to replace the message ... oval:org.secpod.oval:def:48626 The host is installed with Apple Mac OS X through 10.12.6, 10.13.6 or before 10.11.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to perform a denial of service a ... oval:org.secpod.oval:def:48634 The host is installed with Apple Mac OS X through 10.12.6, 10.13.6 or before 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to execute arbitr ... oval:org.secpod.oval:def:48632 The host is installed with Apple Mac OS X through 10.12.6, 10.13.6 or before 10.11.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to cause a denial of service whe ... oval:org.secpod.oval:def:48633 The host is installed with Apple Mac OS X through 10.13.6 or before 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to execute arbitrary code ... oval:org.secpod.oval:def:48631 The host is installed with Apple Mac OS X 10.13.6 or 10.14 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a configuration issue. Successful exploitation allows an attacker to modify protected parts of the file system. oval:org.secpod.oval:def:48638 The host is installed with Apple Mac OS X through 10.12.6 or before 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to execute arbitrary code ... oval:org.secpod.oval:def:48639 The host is installed with Apple Mac OS X through 10.13.6 or before 10.11.6 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to read restricted memory. oval:org.secpod.oval:def:48636 The host is installed with Apple Mac OS X 10.12.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a locking issue. Successful exploitation allows an attacker to execute arbitrary code with kernel privileges. oval:org.secpod.oval:def:48637 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to heap corruption while processing a mali ... oval:org.secpod.oval:def:48645 The host is installed with Apple Mac OS X through 10.12.6, 10.13.6 or before 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows an attacker to break out of its sandbox. oval:org.secpod.oval:def:48646 The host is installed with Apple Mac OS X through 10.12.6, 10.13.6 or before 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows an attacker to break out of its sandbox. oval:org.secpod.oval:def:48643 The host is installed with Apple Mac OS X through 10.12.6, 10.13.6 or before 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to execute arbitrary code ... oval:org.secpod.oval:def:48644 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to execute arbitrary code with ker ... oval:org.secpod.oval:def:48641 The host is installed with Apple Mac OS X through 10.13.6 or before 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to execute arbitrary code with sys ... oval:org.secpod.oval:def:48642 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to execute arbitrary code with ker ... oval:org.secpod.oval:def:48640 The host is installed with Apple Mac OS X through 10.13.6 or before 10.11.6 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to read restricted memory. oval:org.secpod.oval:def:38553 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 or MacOS X before 10.14 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to exploit weaknesses ... oval:org.secpod.oval:def:47524 The host is missing a security update according to Apple advisory, APPLE-SA-2018-9-17-3 . The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle a malicious website. Successful exploitation could allow attackers to spoof user interface ... oval:org.secpod.oval:def:45908 The host is installed with Apple Mac OS X 10.13.4 or 10.12.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a locking issue. Successful exploitation allows attackers to execute arbitrary code with kernel privileges. oval:org.secpod.oval:def:34666 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to an unexpe ... oval:org.secpod.oval:def:34667 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to an unexpe ... oval:org.secpod.oval:def:34664 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to an unexpe ... oval:org.secpod.oval:def:34665 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to an unexpe ... oval:org.secpod.oval:def:34662 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to an unexpe ... oval:org.secpod.oval:def:34660 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to an unexpe ... oval:org.secpod.oval:def:34661 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to an unexpe ... oval:org.secpod.oval:def:60016 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in OpenLDAP. Successful exploitation allows an attacker to encounter multiple issues ... oval:org.secpod.oval:def:60015 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in OpenLDAP. Successful exploitation allows an attacker to encounter multiple issues ... oval:org.secpod.oval:def:43634 The host is installed with Apple Mac OS X 10.13.2 or 10.12.6 and is prone to a denial of service vulnerability. The flaw is present in the application, which fails to properly handle a resource exhaustion issue. Successful exploitation allows an application to cause denial of service. oval:org.secpod.oval:def:43633 The host is installed with Apple Mac OS X 10.13.2 and is prone to an information disclosure vulnerability. The flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an application to read restricted memory. oval:org.secpod.oval:def:43632 The host is installed with Apple Mac OS X 10.13.2 or 10.12.6 and is prone to an arbitrary code execution vulnerability. The flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allows an application to execute an arbitrary code with kernel privile ... oval:org.secpod.oval:def:43631 The host is installed with Apple Mac OS X 10.13.2 or 10.12.6 or 10.11.6 and is prone to an arbitrary code execution vulnerability. The flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an application to execute an arbitrary c ... oval:org.secpod.oval:def:43638 The host is installed with Apple Mac OS X 10.13.2 or 10.12.6 or 10.11.6 and is prone to an information disclosure vulnerability. The flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to read restricted memory. oval:org.secpod.oval:def:43637 The host is installed with Apple Mac OS X 10.13.2 or 10.12.6 and is prone to a privilege escalation vulnerability. The flaw is present in the application, which fails to properly handle a certificate evaluation issue. Successful exploitation makes a certificate to have name constraints applied incor ... oval:org.secpod.oval:def:43636 The host is installed with Apple Mac OS X 10.13.2 and is prone to an unspecified vulnerability. The flaw is present in the application, which fails to properly handle an access issue. Successful exploitation allows a sandboxed process to circumvent sandbox restrictions. oval:org.secpod.oval:def:43635 The host is installed with Apple Mac OS X 10.13.2 or 10.12.6 or 10.11.6 and is prone to an arbitrary code execution vulnerability. The flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to perform an arbitrary code ... oval:org.secpod.oval:def:40570 The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to arbitrary code execution ... oval:org.secpod.oval:def:40581 The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to arbitrary code execution ... oval:org.secpod.oval:def:40588 The host is installed with Apple Safari before 10.1.1 and is prone to an universal cross site scripting vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to universal cross si ... oval:org.secpod.oval:def:40593 The host is missing a security update according to Apple advisory, APPLE-SA-2017-05-15-7. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle maliciously crafted web content. Successful exploitation could allow attackers to execute ... oval:org.secpod.oval:def:43623 The host is installed with Apple Safari before 11.0.3 or Apple Mac OS X 10.13.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications, which fails to properly handle crafted web content. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:43622 The host is installed with Apple Safari before 11.0.3 or Apple Mac OS X 10.13.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications, which fails to properly handle crafted web content. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:43621 The host is installed with Apple Safari before 11.0.3 or Apple Mac OS X 10.13.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications, which fails to properly handle crafted web content. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:43627 The host is installed with Apple Mac OS X 10.13.2 or 10.12.6 or 10.11.6 and is prone to an arbitrary code execution vulnerability. The flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows attackers to execute an arbitrary code w ... oval:org.secpod.oval:def:43626 The host is installed with Apple Mac OS X 10.13.2 and is prone to a denial of service vulnerability. The flaw is present in the application, which fails to properly handle an out-of-bounds read issue. Successful exploitation allows attackers to cause a denial of service. oval:org.secpod.oval:def:43625 The host is installed with Apple Mac OS X 10.13.2 or 10.12.6 and is prone to a remote code execution vulnerability. The flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows attackers to execute an arbitrary code by processing a ... oval:org.secpod.oval:def:43624 The host is missing a security update for Apple advisory, APPLE-SA-2018-1-23-5. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fails to properly handle crafted web content. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:43629 The host is installed with Apple Mac OS X 10.13.2 and is prone to an information disclosure vulnerability. The flaw is present in the application, which fails to properly handle a memory initialization issue. Successful exploitation allows an application to read restricted memory. oval:org.secpod.oval:def:43630 The host is installed with Apple Mac OS X 10.13.2 and is prone to an information disclosure vulnerability. The flaw is present in the application, which fails to properly handle a race condition issue. Successful exploitation allows an application to read restricted memory. oval:org.secpod.oval:def:44915 The host is installed with Apple Safari before 11.0.2 and is prone to an user interface spoofing vulnerability. A flaw is present in the application, which fails to properly handle malicious website. Successful exploitation may lead to user interface spoofing. oval:org.secpod.oval:def:44916 The host is installed with Apple Safari before 11.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:44917 The host is installed with Apple Safari before 11.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:44918 The host is installed with Apple Safari before 11.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation may lead to arbitrary code execution. oval:org.secpod.oval:def:38398 The host is installed with Apple Safari before 10.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:38399 The host is installed with Apple Safari before 10.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:38393 The host is installed with Apple Safari before 10.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:38394 The host is installed with Apple Safari before 10.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:38395 The host is installed with Apple Safari before 10.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:38396 The host is installed with Apple Safari before 10.0.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:38397 The host is installed with Apple Safari before 10.0.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to disclose user information. oval:org.secpod.oval:def:48665 The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle speculative reads of system registers issue. Successful exploitation may allow unauthorized disclosure of ... oval:org.secpod.oval:def:38401 The host is installed with Apple Safari before 10.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:38403 The host is installed with Apple Safari before 10.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:38405 The host is installed with Apple Safari before 10.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:48635 The host is installed with Apple Mac OS X through 10.12.6, 10.13.6 or before 10.11.6 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle the speculative execution and address translations issues. Successful exploitation allows ... oval:org.secpod.oval:def:38417 The host is missing a security update according to Apple advisory, APPLE-SA-2016-09-20-2. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code o ... oval:org.secpod.oval:def:38410 The host is installed with Apple Safari before 10.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:38411 The host is installed with Apple Safari before 10.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:38412 The host is installed with Apple Safari before 10.0.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to disclose user information. oval:org.secpod.oval:def:38413 The host is installed with Apple Safari before 10.0.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to disclose user information. oval:org.secpod.oval:def:38414 The host is installed with Apple Safari before 10.0.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to disclose user information. oval:org.secpod.oval:def:38415 The host is installed with Apple Safari before 10.0.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to disclose user information. oval:org.secpod.oval:def:38416 The host is installed with Apple Safari before 10.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to an unexpected application terminatio ... oval:org.secpod.oval:def:38409 The host is installed with Apple Safari before 10.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:42608 The host is installed with Apple Safari before 11.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitrary code execution. oval:org.secpod.oval:def:42609 The host is installed with Apple Safari before 11.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitrary code execution. oval:org.secpod.oval:def:42618 The host is missing a security update according to Apple advisory, APPLE-SA-2017-10-31-5. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation allow attackers to perf ... oval:org.secpod.oval:def:42617 The host is installed with Apple Safari before 11.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitrary code execution. oval:org.secpod.oval:def:41453 The host is missing a security update according to Apple advisory, APPLE-SA-2017-07-19-5. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle maliciously crafted web content. Successful exploitation could allow attackers to execute ... oval:org.secpod.oval:def:41429 The host is installed with Apple Safari before 10.1.2 and is prone to a cross-origin bypass vulnerability. A flaw is present in the application, which fails to properly handle malicious website. Successful exploitation could allow attackers to exfiltrate data cross-origin. oval:org.secpod.oval:def:41430 The host is installed with Apple Safari before 10.1.2 and is prone to an address bar spoofing vulnerability. A flaw is present in the application, which fails to properly handle malicious website. Successful exploitation could allow attackers to lead to address bar spoofing. oval:org.secpod.oval:def:41433 The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code oval:org.secpod.oval:def:41434 The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code oval:org.secpod.oval:def:41431 The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code oval:org.secpod.oval:def:41432 The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code oval:org.secpod.oval:def:41437 The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code oval:org.secpod.oval:def:41438 The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code oval:org.secpod.oval:def:41435 The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code oval:org.secpod.oval:def:41436 The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code oval:org.secpod.oval:def:41439 The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code oval:org.secpod.oval:def:41440 The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code oval:org.secpod.oval:def:41441 The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code oval:org.secpod.oval:def:41444 The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code oval:org.secpod.oval:def:41445 The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code oval:org.secpod.oval:def:41442 The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code oval:org.secpod.oval:def:41443 The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code oval:org.secpod.oval:def:41448 The host is installed with Apple Safari before 10.1.2 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to cause cross site scripting. oval:org.secpod.oval:def:41449 The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code oval:org.secpod.oval:def:41446 The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code oval:org.secpod.oval:def:41447 The host is installed with Apple Safari before 10.1.2 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to cause cross site scripting. oval:org.secpod.oval:def:41451 The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code oval:org.secpod.oval:def:41452 The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code oval:org.secpod.oval:def:41450 The host is installed with Apple Safari before 10.1.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to read restricted memory. oval:org.secpod.oval:def:46330 The host is installed with Apple Mac OS X 10.11.6, 10.12.6 or 10.13.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle issues in systems using Intel Core-based microprocessors. Successful exploitation allows a local process ... oval:org.secpod.oval:def:43216 The host is installed with Apple Safari before 11.0.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitrary code execution. oval:org.secpod.oval:def:43215 The host is installed with Apple Safari before 11.0.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitrary code execution. oval:org.secpod.oval:def:43214 The host is installed with Apple Safari before 11.0.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitrary code execution. oval:org.secpod.oval:def:43219 The host is missing a security update according to Apple advisory, APPLE-SA-2017-10-31-5. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation allow attackers to perfo ... oval:org.secpod.oval:def:43218 The host is installed with Apple Safari before 11.0.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitrary code execution. oval:org.secpod.oval:def:43217 The host is installed with Apple Safari before 11.0.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitrary code execution. oval:org.secpod.oval:def:45915 The host is installed with Apple Mac OS X 10.11.6 or 10.12.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle an undocumented instructions issue. Successful exploitation allows attackers to execute arbitrary code with ker ... oval:org.secpod.oval:def:53540 The host is installed with Apple Mac OS X through 10.12.6, 10.13.6 or 10.14.3 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues. Successful exploitation allows attackers to execute arbitrary code or read restricted memo ... oval:org.secpod.oval:def:38801 The host is installed with Apple Mac OS X or Server 10.12.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly block malicious popups. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:42138 The host is installed with Apple Safari before 11 and is prone to an universal cross site scripting vulnerability. A flaw is present in the application, which fails to properly handle the parent-tab. Successful exploitation could allow attackers to lead to universal cross site scripting. oval:org.secpod.oval:def:42140 The host is missing a security update according to Apple advisory, APPLE-SA-2017-09-20-2. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle a malicious website. Successful exploitation could allow attackers to lead to add ... oval:org.secpod.oval:def:39649 The host is installed with Apple Mac OS X or Server 10.12.3 or 10.11.6 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly perform constant time computation. Successful exploitation could allow attackers to leak sensitive user inform ... oval:org.secpod.oval:def:3114 The host is installed with Apple Mac OS X 10.6.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to validate DNSSEC (1) NSEC and (2) NSEC3 records. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3113 The host is installed with Apple Mac OS X 10.6.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a recursive client query and a response that contains an Additional section with crafted data. Successful exploitation could allow attackers ... oval:org.secpod.oval:def:3159 The host is installed with Apple Mac OS X 10.6.8 and 10.7.0 before 10.7.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to detect recursion during entity expansion. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:4281 The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to handle a client disconnection during listing of a large number of print jobs. Successful exploitation could allow attackers to c ... oval:org.secpod.oval:def:4305 The host is missing a security update according to Apple advisory, APPLE-SA-2010-06-15-1 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to handle malicious data. Successful exploitation allows remote attackers to crash the service, execute arbitrary o ... oval:org.secpod.oval:def:3503 The host is installed with Apple Mac OS X 10.5.8 or 10.6.2 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle abstract file-descriptor handling interface in the cupsdDoSelect. Successful exploitation could allow attackers to crash the service ... oval:org.secpod.oval:def:17017 The host is installed with Apple Mac OS X 10.9 before 10.9.2 and is prone to SSL spoofing vulnerability. A flaw is present in the application, which fails to check the signature in a TLS Server Key Exchange message. Successful exploitation allows attackers to spoof SSL servers by using an arbitrary ... oval:org.secpod.oval:def:2849 The host is installed with Apple Mac OS X 10.6 through 10.6.7 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to check the CRL properly and a revoked certificate may be accepted as valid. Successful exploitation could allow attackers to spo ... oval:org.secpod.oval:def:3930 The host is missing a critical security update according to Apple advisory, APPLE-SA-2012-02-01-1. The update is required to fix multiple vulnerabilities. The flaws are present in the applications which fail to sanitize user supplied input. Successful exploitation could allow attackers to execute ar ... oval:org.secpod.oval:def:25288 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to a cipher-downgrade vulnerability. A flaw is present in the application, which does not properly convey a DHE_EXPORT choice. Successful exploitation allows man-in-the-middle attackers to conduct cipher-downgra ... oval:org.secpod.oval:def:48684 The host is installed with Apple Mac OS X through 10.12.6, 10.13.6 or 10.14 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues. Successful exploitation allows remote attackers to execute arbitrary code or read restricted ... oval:org.secpod.oval:def:48630 The host is installed with Apple Mac OS X through 10.13.6 or before 10.11.6 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a speculative execution of memory reads issue. Successful exploitation allows an attacker with loc ... oval:org.secpod.oval:def:3863 The host is installed with Apple Mac OS X 10.5.5 or 10.5.8 and is prone to untrusted search path vulnerability. A flaw is present in the application, which fails to properly handle a Trojan horse Python file in the current working directory. Successful exploitation could allow attackers to execute a ... oval:org.secpod.oval:def:38800 The host is installed with Apple Mac OS X or Server 10.12.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle certain modeline options. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:62195 The host is installed with Apple Mac OS X 10.15.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. Successful exploitation allows an attacker to disclose restricted memory. oval:org.secpod.oval:def:57623 The host is installed with Apple Mac OS X through 10.12.6, 10.13.6 or 10.14.5 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues. Successful exploitation allows attackers to execute arbitrary code or read restricted memo ... oval:org.secpod.oval:def:54654 The host is missing a security update according to Apple advisory, APPLE-SA-2019-5-13-2. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to cause memory ... oval:org.secpod.oval:def:46333 The host is installed with Apple Mac OS 10.13.5, 10.12.6 or 10.11.6 and is prone to multiple vulnerabilities. The flaw is present in the application, which fails to properly handle multiple issues. Successful exploitation allows remote attackers to execute arbitrary code or read restricted memory. oval:org.secpod.oval:def:45898 The host is installed with Apple Mac OS 10.13.4, 10.12.6 or 10.11.6 and is prone to multiple vulnerabilities. The flaw is present in the application, which fails to properly handle multiple issues. Successful exploitation allows remote attackers to execute arbitrary code or read restricted memory or ... oval:org.secpod.oval:def:43639 The host is installed with Apple Mac OS 10.13.1 or 10.12.6 or 10.11.6 and is prone to multiple vulnerabilities. The flaw is present in the application, which fails to properly handle multiple issues. Successful exploitation allows remote attackers to execute arbitrary code or read restricted memory. oval:org.secpod.oval:def:43628 The host is installed with Apple Mac OS X 10.12.6 or 10.11.6 and is prone to an information disclosure vulnerability. The flaw is present in the application, which fails to properly handle systems with microprocessors utilizing speculative execution and indirect branch prediction. Successful exploit ... oval:org.secpod.oval:def:34663 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to have unsp ... oval:org.secpod.oval:def:37843 The host is missing a critical security update according to Apple advisory, APPLE-SA-2016-10-24-2. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute a ... oval:org.secpod.oval:def:37833 The host is installed with Apple Mac OS X or Server 10.12 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to cause a relayed call to continue transmitting audio while appearing as if ... oval:org.secpod.oval:def:31530 The host is installed with Apple Mac OS X or Server 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted package that is mishandled during dispatch calls. Successful exploitation could allo ... oval:org.secpod.oval:def:31524 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a double free vulnerability. A flaw is present in the application, which fails to handle a crafted app that accesses AtomicBufferedFile descriptors. Successful exploitation could allow attackers to write to ar ... oval:org.secpod.oval:def:31525 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a double free vulnerability. A flaw is present in the application, which fails to handle a crafted app that accesses AtomicBufferedFile descriptors. Successful exploitation could allow attackers to write to ar ... oval:org.secpod.oval:def:31526 The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted metadata in an image. Successful exploitation could allow remote attackers to execute arbitrary code o ... oval:org.secpod.oval:def:31527 The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted metadata in an image. Successful exploitation could allow remote attackers to execute arbitrary code o ... oval:org.secpod.oval:def:31520 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted SNMP trap message, which triggers a conversion to the variable type designated in the MIB file. Successf ... oval:org.secpod.oval:def:31521 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle pre-authentication process. Successful exploitation could allow attackers to conduct impersonation attacks. oval:org.secpod.oval:def:31522 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle vectors involving NVRAM parameters. Successful exploitation could allow attackers to gain privileges. oval:org.secpod.oval:def:31523 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to bypass an intended user-confirmation requireme ... oval:org.secpod.oval:def:31528 The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font file. Successful exploitation could allow remote attackers to execute arbitrary code or cause a ... oval:org.secpod.oval:def:31529 The host is installed with Apple Mac OS X or Server 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font file. Successful exploitation could allow attackers to execute arbitrary code o ... oval:org.secpod.oval:def:31513 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow local users to obtain sensitive information from ke ... oval:org.secpod.oval:def:31514 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow local users to obtain sensitive information from ke ... oval:org.secpod.oval:def:31515 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow local users to gain privileges or cause a denial of servi ... oval:org.secpod.oval:def:31516 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code in a privileged conte ... oval:org.secpod.oval:def:31510 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle crafted bookmark metadata in a folder. Successful exploitation could allow remote attackers to cause a denial of s ... oval:org.secpod.oval:def:31511 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted font file. Successful exploitation could allow remote attackers to cause a denial of service (applicatio ... oval:org.secpod.oval:def:31512 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted font file. Successful exploitation could allow remote attackers to cause a denial of service (applicatio ... oval:org.secpod.oval:def:31517 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:31518 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation could allow attackers to cause a denial of service. oval:org.secpod.oval:def:31519 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation could allow attackers to cause a denial of service. oval:org.secpod.oval:def:31502 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a symlink attack vulnerability. A flaw is present in the application, which fails to properly handle a crafted app. Successful exploitation could allow remote attackers to write to arbitrary ... oval:org.secpod.oval:def:31503 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted web site. Successful exploitation could allow remote attackers to execute ar ... oval:org.secpod.oval:def:31504 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted app. Successful exploitation could allow remote attackers to execute arbitrary code. oval:org.secpod.oval:def:31505 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to properly handle a crafted CPIO archive. Successful exploitation could allow remote attackers to execute arbitrary code. oval:org.secpod.oval:def:31500 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted metadata in an image. Successful exploitation could allow remote attackers to ... oval:org.secpod.oval:def:31501 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted app. Successful exploitation could allow remote attackers to execute arbitra ... oval:org.secpod.oval:def:31506 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a cookie overwrite execution vulnerability. A flaw is present in the application, which does not properly consider the uppercase-versus-lowercase distinction during cookie parsing. Successful exploitation coul ... oval:org.secpod.oval:def:31507 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted app that sends a spoofed configd response to a client. Successful exploitation could allow remo ... oval:org.secpod.oval:def:31508 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted font file. Successful exploitation could allow remote attackers to execute arbitrary code or cause a den ... oval:org.secpod.oval:def:31509 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation could allow remote attackers to execute arbitrary code or cause a denial of ... oval:org.secpod.oval:def:31531 The host is installed with Apple Mac OS X or Server 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted developer-signed app. Successful exploitation could allow attackers to bypass intend ... oval:org.secpod.oval:def:31532 The host is installed with Apple Mac OS X or Server 10.10.5 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly process Mach task. Successful exploitation could allow attackers to bypass intended entitlement restrictions and gain privil ... oval:org.secpod.oval:def:31533 The host is missing a security update according to Apple advisory, APPLE-SA-2015-10-21-4. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to execute arbitrary code, dis ... oval:org.secpod.oval:def:34683 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to cause unspecified impact. oval:org.secpod.oval:def:39600 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle a truncated manifest entry in a PHAR archive. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:39601 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an off-by-one error vulnerability. A flaw is present in the application, which fails to properly handle a crafted PHAR archive with an alias mismatch. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:39602 The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted serialized data. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:39718 The host is missing a security update according to Apple advisory, APPLE-SA-2017-03-27-3. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary ... oval:org.secpod.oval:def:3032 The host is installed with PHP 5.3.4 and is prone to a null byte injection vulnerability. A flaw is present in the application, which accepts the \0 character in a pathname. Successful exploitation could allow attackers to bypass intended access restrictions. oval:org.secpod.oval:def:38497 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle apache_mod_php. Successful exploitation may cause an unexpected application termination or arbit ... oval:org.secpod.oval:def:38492 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle apache_mod_php. Successful exploitation may cause an unexpected application termination or arbit ... oval:org.secpod.oval:def:38493 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle apache_mod_php. Successful exploitation may cause an unexpected application termination or arbit ... oval:org.secpod.oval:def:38494 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle apache_mod_php. Successful exploitation may cause an unexpected application termination or arbit ... oval:org.secpod.oval:def:38495 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle apache_mod_php. Successful exploitation may cause an unexpected application termination or arbit ... oval:org.secpod.oval:def:38496 The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle apache_mod_php. Successful exploitation may cause an unexpected application termination or arbit ... oval:org.secpod.oval:def:38489 The host is missing a critical security update according to Apple advisory, APPLE-SA-2016-12-13-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute a ... oval:org.secpod.oval:def:3050 The host is missing an important security update according to, APPLE-SA-2011-03-21-1. The update is required to fix multiple remote code execution vulnerabilities. The flaws are present in the application, which fail to sanitize user supplied input. Successful exploitation could allow attackers to e ... oval:org.secpod.oval:def:25253 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to gain privileges. oval:org.secpod.oval:def:25254 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to gain privileges. oval:org.secpod.oval:def:25255 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in libtiff, which fails to handle unspecified vectors. Successful exploitation allows attackers to arbitrary code execution. oval:org.secpod.oval:def:25256 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in libtiff, which fails to handle unspecified vectors. Successful exploitation allows attackers to arbitrary code execution. oval:org.secpod.oval:def:25257 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in libtiff, which fails to handle unspecified vectors. Successful exploitation allows attackers to arbitrary code execution. oval:org.secpod.oval:def:25258 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in libtiff, which fails to handle unspecified vectors. Successful exploitation allows attackers to arbitrary code execution. oval:org.secpod.oval:def:25259 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted TIFF image. Successful exploitation allows attackers to execute arbitrary cod ... oval:org.secpod.oval:def:25250 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to gain privileges. oval:org.secpod.oval:def:25251 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to gain privileges. oval:org.secpod.oval:def:25252 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to gain privileges. oval:org.secpod.oval:def:25239 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted text file. Successful exploitation allows attackers to execute arbitrary cod ... oval:org.secpod.oval:def:25242 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted text file. Successful exploitation allows attackers to execute arbitrary cod ... oval:org.secpod.oval:def:25243 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted text file. Successful exploitation allows attackers to execute arbitrary cod ... oval:org.secpod.oval:def:25244 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted app. Successful exploitation allows attackers to obtain sensitive memo ... oval:org.secpod.oval:def:25245 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not enforce a locking protection mechanism upon being woken from sleep. Successful exploitation allows attac ... oval:org.secpod.oval:def:25246 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not properly set refresh rates for DDR3 RAM. Successful exploitation allows attackers to conduct row-hammer ... oval:org.secpod.oval:def:25247 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to gain privileges. oval:org.secpod.oval:def:25248 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to gain privileges. oval:org.secpod.oval:def:25249 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to gain privileges. oval:org.secpod.oval:def:25240 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted text file. Successful exploitation allows attackers to execute arbitrary cod ... oval:org.secpod.oval:def:25241 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted text file. Successful exploitation allows attackers to execute arbitrary cod ... oval:org.secpod.oval:def:25235 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted app. Successful exploitation allows attackers to obtain sensitive memo ... oval:org.secpod.oval:def:25236 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted app. Successful exploitation allows attackers to execute arbitrary code in a ... oval:org.secpod.oval:def:25237 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle crafted credentials in a URL. Successful exploitation allows attackers to execute arbi ... oval:org.secpod.oval:def:25238 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted text file. Successful exploitation allows attackers to execute arbitrary cod ... oval:org.secpod.oval:def:25297 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to a symlink attack vulnerability. A flaw is present in the application, which fails to handle a crafted app that conducts a symlink attack. Successful exploitation allows remote attackers to write to arbitrary ... oval:org.secpod.oval:def:25298 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a crafted app that conducts a symlink attack. Successful exploitation allows remote attackers to bypass intended si ... oval:org.secpod.oval:def:25299 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a crafted HTML e-mail message. Successful exploitation allows remote attackers to trigger a refresh operation, and ... oval:org.secpod.oval:def:25290 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted font file. Successful exploitation allows remote attackers to execute arbitrary code or cause a ... oval:org.secpod.oval:def:25291 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation allows remote attackers to execute arbitrary code in a privileged ... oval:org.secpod.oval:def:25292 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation allows remote attackers to execute arbitrary code in a privileged ... oval:org.secpod.oval:def:25293 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation allows remote attackers to execute arbitrary code in a privileged ... oval:org.secpod.oval:def:25294 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation allows remote attackers to execute arbitrary code in a privileged ... oval:org.secpod.oval:def:25295 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation allows remote attackers to obtain sensitive memory-layout informatio ... oval:org.secpod.oval:def:25296 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which does not properly handle HFS parameters. Successful exploitation allows remote attackers to obtain sensitive memory-layout ... oval:org.secpod.oval:def:25286 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted font file. Successful exploitation allows attackers to execute arbitrary code or cause a denial of serv ... oval:org.secpod.oval:def:25287 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted font file. Successful exploitation allows attackers to execute arbitrary code or cause a denial of serv ... oval:org.secpod.oval:def:25289 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted app that leverages control of a function pointer. Successful exploitation allows remote attacke ... oval:org.secpod.oval:def:25280 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to execute arbitrary code or cause a denial of ... oval:org.secpod.oval:def:25281 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a crafted URL. Successful exploitation allows attackers to bypass HTTP authentication. oval:org.secpod.oval:def:25282 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation allows attackers to obtain sensitive memory-layout information. oval:org.secpod.oval:def:25283 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified Thunderbolt commands. Successful exploitation allows attackers to gain privileges or cause a denial o ... oval:org.secpod.oval:def:25284 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted font file. Successful exploitation allows attackers to execute arbitrary code or cause a denial of serv ... oval:org.secpod.oval:def:25285 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted font file. Successful exploitation allows attackers to execute arbitrary code or cause a denial of serv ... oval:org.secpod.oval:def:25275 The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not properly verify XPC entitlements. Successful exploitation allows attackers to bypass authentication and obtain a ... oval:org.secpod.oval:def:25276 The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not properly handle authentication errors. Successful exploitation allows attackers to bypass authentication and obt ... oval:org.secpod.oval:def:25279 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not properly restrict the location of writeconfig clients. Successful exploitation allows attackers to obtain root privileges ... oval:org.secpod.oval:def:25270 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code or c ... oval:org.secpod.oval:def:25271 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle a large size value. Successful exploitation allows attackers to cause a denial of service or po ... oval:org.secpod.oval:def:25272 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not properly consider custom resource rules during app signature verification. Successful exploitation allow ... oval:org.secpod.oval:def:25273 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not properly consider libraries that are external to an application bundle. Successful exploitation allows a ... oval:org.secpod.oval:def:25274 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an arbitrary commands execution vulnerability. A flaw is present in the application, which fails to handle a crafted name of a photo file within the local photo library. Successful exploitat ... oval:org.secpod.oval:def:25264 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code or c ... oval:org.secpod.oval:def:25265 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code or c ... oval:org.secpod.oval:def:25266 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code or c ... oval:org.secpod.oval:def:25267 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code or c ... oval:org.secpod.oval:def:25268 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code or c ... oval:org.secpod.oval:def:25269 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code or c ... oval:org.secpod.oval:def:25260 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation allows attackers to execute arbitrary code in a ... oval:org.secpod.oval:def:25261 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation allows attackers to obtain sensitive memory-layout ... oval:org.secpod.oval:def:25262 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which requires a correct MAC only if the MAC field has a nonzero length. Successful exploitation allows attackers to ... oval:org.secpod.oval:def:25263 The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which requires a correct MAC only if the MAC field has a nonzero length. Successful exploitation allows attackers to ... oval:org.secpod.oval:def:26614 The host is installed with Apple Mac OS X or Server 10.8, 10.9 or before 10.10.5 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle a crafted unserialize call that leverages use of the unset function within an __wakeup function. Successful ex ... oval:org.secpod.oval:def:26617 The host is installed with Apple Mac OS X or Server 10.8, 10.9 or before 10.10.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle pipelined HTTP requests. Successful exploitation allow attackers to cause a denial of service (application c ... oval:org.secpod.oval:def:26616 The host is installed with Apple Mac OS X or Server 10.8, 10.9 or before 10.10.5 and is prone to multiple stack-based buffer overflow vulnerabilities. The flaws are present in the application, which fails to handle a crafted length value in a (1) tar, (2) phar, or (3) ZIP archive. Successful exploit ... oval:org.secpod.oval:def:26622 The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which truncates a pathname upon encountering a \x00 character in certain situations. Successful exploitation allows attackers t ... oval:org.secpod.oval:def:26621 The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which truncates a pathname upon encountering a \x00 character in certain situations. Successful exploitation allows attackers t ... oval:org.secpod.oval:def:26613 The host is installed with Apple Mac OS X or Server 10.8, 10.9 or before 10.10.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted length value in conjunction with crafted serialized data in a phar archive. Successful explo ... oval:org.secpod.oval:def:37306 The host is missing a critical security update according to Apple advisory, APPLE-SA-2016-09-20. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arb ... oval:org.secpod.oval:def:25305 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted CLIENT-MASTER-KEY message. Successful exploitation allows remote attackers to cause denial of service ( ... oval:org.secpod.oval:def:25307 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted app, related to a "type confusion" issue. Successful exploitation allows remote attackers to ex ... oval:org.secpod.oval:def:25308 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted font file. Successful exploitation allows remote attackers to execute arbitrary code or cause a ... oval:org.secpod.oval:def:25309 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted font file. Successful exploitation may lead to an unexpected application termination or arbitra ... oval:org.secpod.oval:def:25310 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted font file. Successful exploitation may lead to an unexpected application termination or arbitra ... oval:org.secpod.oval:def:25311 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted font file. Successful exploitation may lead to an unexpected application termination or arbitra ... oval:org.secpod.oval:def:25312 The host is missing a security update according to Apple advisory, APPLE-SA-2015-06-30-2. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle a crafted vectors. Successful exploitation leads to information disclosure, security bypas ... oval:org.secpod.oval:def:25300 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle a malformed Elliptic Curve (EC) private-key file that is improperly handled during import. Successful exploitation ... oval:org.secpod.oval:def:25301 The host is installed with Apple Mac OS X or Server 10.8, 10.9 or before 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted X.509 certificate to an endpoint that uses the certificate-verification feature. Successful exploi ... oval:org.secpod.oval:def:25302 The host is installed with Apple Mac OS X or Server 10.8, 10.9 or before 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which does not reinitialize CHOICE and ADB data structures. Successful exploitation allow remote attackers to cause a denial of se ... oval:org.secpod.oval:def:25303 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle an invalid certificate key. Successful exploitation allows remote attackers to cause a denial of service (NULL po ... oval:org.secpod.oval:def:25304 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which does not properly handle a lack of outer ContentInfo. Successful exploitation allows remote attackers to cause a denial of servic ... oval:org.secpod.oval:def:37371 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected application termination or arbitrary code execut ... oval:org.secpod.oval:def:37370 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected application termination or arbitrary code execut ... oval:org.secpod.oval:def:37363 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected application termination or arbitrary code execut ... oval:org.secpod.oval:def:37360 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected application termination or arbitrary code execut ... oval:org.secpod.oval:def:37368 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected application termination or arbitrary code execut ... oval:org.secpod.oval:def:37366 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected application termination or arbitrary code execut ... oval:org.secpod.oval:def:37365 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected application termination or arbitrary code execut ... oval:org.secpod.oval:def:37364 The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected application termination or arbitrary code execut ... oval:org.secpod.oval:def:26707 The host is missing a security update according to Apple advisory, APPLE-SA-2015-08-13-2. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle a crafted vectors. Successful exploitation may lead to an unexpected application terminati ... oval:org.secpod.oval:def:30897 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation could allow remote attackers to execute arbitrary code. oval:org.secpod.oval:def:30898 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a code-signing protection mechanism vulnerability. A flaw is present in the application, which fails to properly handle an app that places a crafted signature in an executable file. Successful exploitation could ... oval:org.secpod.oval:def:30899 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation could allow remote attackers to execute arbitrary code with system privilege ... oval:org.secpod.oval:def:30893 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a crafted web site. Successful exploitation could allow attackers to bypass the Safari private-browsing protec ... oval:org.secpod.oval:def:30894 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a cookie-injection attack vulnerability. A flaw is present in the application, which fails to properly handle a crafted response. Successful exploitation could allow remote proxy servers to conduct cookie-injecti ... oval:org.secpod.oval:def:30895 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a man-in-the-middle attack vulnerability. A flaw is present in the application, which fails to properly handle a crafted certificate. Successful exploitation could allow remote attackers to spoof servers and obta ... oval:org.secpod.oval:def:30896 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly process font files. Successful exploitation could allow remote attackers to execute arbitrary code. oval:org.secpod.oval:def:30890 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle top level domains. Successful exploitation could allow attackers in a privileged network position to trac ... oval:org.secpod.oval:def:30891 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle FTP packets when using the PASV command. Successful exploitation could allow attackers to cause the cl ... oval:org.secpod.oval:def:30892 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a HSTS protection mechanism bypass vulnerability. A flaw is present in the application, which fails to properly handle a crafted URL. Successful exploitation could allow attackers to bypass the HSTS protection me ... oval:org.secpod.oval:def:30886 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a crafted second argument. Successful exploitation could allow attackers to bypass intended extension restrict ... oval:org.secpod.oval:def:30887 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a crafted app. Successful exploitation could allow attackers to obtain access to keychain items. oval:org.secpod.oval:def:30888 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle attempts to send events to a different user. Successful exploitation could allow attackers to bypass intended ... oval:org.secpod.oval:def:30889 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle audio files. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:30882 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a NULL pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle a crafted name. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:30883 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle vectors that trigger an attempted renaming of a Phar archive to the name of an existing file. Successful explo ... oval:org.secpod.oval:def:30884 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a large regular expression. Successful exploitation could allow attackers to execute arbitrary code ... oval:org.secpod.oval:def:30885 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle a ZIP archive that contains many entries. Successful exploitation could allow attackers to execute arbitrary ... oval:org.secpod.oval:def:17028 The host is installed with Apple Mac OS X or Server 10.7.5, 10.8.5, 10.9 or 10.9.1 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate. Success ... oval:org.secpod.oval:def:38790 The host is installed with Apple Mac OS X or Server 10.12.2 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle an integer underflow in a calculation. Successful exploitation may cause an unexpected application termination ... oval:org.secpod.oval:def:38789 The host is missing a security update according to Apple advisory, APPLE-SA-2017-01-23-2. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary ... oval:org.secpod.oval:def:30880 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an uninitialized pointer free vulnerability. A flaw is present in the application, which fails to properly handle a crafted EXIF data in a JPEG image. Successful exploitation could allow attackers to execute arbi ... oval:org.secpod.oval:def:30881 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:30875 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly process an invalid file that begins with a # character and lacks a newline character. Successful exploitation cou ... oval:org.secpod.oval:def:30876 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an out-of-bounds memory access vulnerability. A flaw is present in the application, which fails to properly handle a crafted file. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:30877 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle vectors that trigger creation of multiple dictionaries. Successful exploitation could allow attacke ... oval:org.secpod.oval:def:30878 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a buffer over-read vulnerability. A flaw is present in the application, which fails to properly handle a crafted GIF image. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:30873 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle an environment variable. Successful exploitation could allow attackers to inject arbitrary code. oval:org.secpod.oval:def:30874 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly process eSCL packets. Successful exploitation could allow attackers to extract payload from eSCL packets sent ... oval:org.secpod.oval:def:30879 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle a crafted unserialize call. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:30910 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a kernel memory-layout information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow local users to obtain sen ... oval:org.secpod.oval:def:30911 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow local users to gain privileges or cause a denial of ... oval:org.secpod.oval:def:30916 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted app. Successful exploitation allow attackers to execute arbitrary code in a privileged context or ca ... oval:org.secpod.oval:def:30917 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted app. Successful exploitation allow attackers to execute arbitrary code in a privileged context or ca ... oval:org.secpod.oval:def:30918 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly initialize an unspecified data structure. Successful exploitation could allow local users to obtain sensitive ... oval:org.secpod.oval:def:30919 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allow local users to gain privileges or cause a denial of servi ... oval:org.secpod.oval:def:30912 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow local users to gain privileges or cause a denial of ... oval:org.secpod.oval:def:30913 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow local users to gain privileges or cause a denial of ... oval:org.secpod.oval:def:30914 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow local users to gain privileges or cause a denial of ... oval:org.secpod.oval:def:30915 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a kernel memory-layout information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted app. Successful exploitation allow attackers to obtain sensitive kernel ... oval:org.secpod.oval:def:30909 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to gain privileges or crash the service. oval:org.secpod.oval:def:30900 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted app that writes to an unintended address. Successful exploitation could allow remote attackers to ... oval:org.secpod.oval:def:30905 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted text. Successful exploitation could allow attackers to crash the service or execute arbitra ... oval:org.secpod.oval:def:30906 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle crafted text. Successful exploitation could allow attackers to crash the service or execute arbitrary code. oval:org.secpod.oval:def:30907 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to produce unknown impact. oval:org.secpod.oval:def:30908 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a privileged executable. Successful exploitation could allow attackers to gain root privileges. oval:org.secpod.oval:def:30901 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle an Apple Ethernet Thunderbolt adapter with crafted code in an Option ROM. Successful exploitation could allow ... oval:org.secpod.oval:def:30902 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly delete Trash files. Successful exploitation could allow local users to obtain sensitive information by readin ... oval:org.secpod.oval:def:30903 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted Game Center app. Successful exploitation could allow attackers to discover the e-mail addres ... oval:org.secpod.oval:def:30904 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a replay attack vulnerability. A flaw is present in the application, which fails to properly handle a packet data that represents a Kerberos authenticated request. Successful exploitation could allow attackers to ... oval:org.secpod.oval:def:30952 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a kernel memory-layout information disclosure vulnerability. A flaw is present in the application, which fails to properly perform bounds checking. Successful exploitation could allow attackers to determine kerne ... oval:org.secpod.oval:def:30950 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle crafted TLS data. Successful exploitation could allow attackers to have an unspecified impact. oval:org.secpod.oval:def:30951 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation could allow attackers to execute arbitrary code with kernel privileges. oval:org.secpod.oval:def:30956 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow local users to bypass intended telephone-call restric ... oval:org.secpod.oval:def:30957 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a content spoofing vulnerability. A flaw is present in the application, which fails to properly interpret directional override formatting characters differently. Successful exploitation could allow remote attacke ... oval:org.secpod.oval:def:30958 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle vectors involving a command character in an href. Successful exploitation could allow remote attack ... oval:org.secpod.oval:def:30959 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle vectors involving multiple whitespace characters before an empty href. Successful exploitation coul ... oval:org.secpod.oval:def:30941 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allow remote attackers to crash the service. oval:org.secpod.oval:def:30942 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted email header. Successful exploitation allow remote attackers to crash the service or exec ... oval:org.secpod.oval:def:30943 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle vectors involving environment variables. Successful exploitation allow local users to obtain root privile ... oval:org.secpod.oval:def:30944 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle malicious data. Successful exploitation allow attackers to crash the service. oval:org.secpod.oval:def:30940 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly support wildcards on AcceptEnv lines in sshd_config. Successful exploitation allow remote attackers to bypass intende ... oval:org.secpod.oval:def:30949 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a man-in-the-middle attack vulnerability. A flaw is present in the application, which fails to properly recognize that the kSecRevocationRequirePositiveResponse flag implies a revocation-checking requirement. Suc ... oval:org.secpod.oval:def:30945 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted XML document. Successful exploitation allow attackers to crash the service. oval:org.secpod.oval:def:30946 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted XML document containing an empty string. Successful exploitation allow attackers to crash the serv ... oval:org.secpod.oval:def:30947 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an improper hostname verification vulnerability. A flaw is present in the application, which fails to properly match hostnames. Successful exploitation could cause Ruby TLS/SSL clients to accept certain certifica ... oval:org.secpod.oval:def:30948 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly display lock state of the keychain. Successful exploitation could allow attackers to produce unspecified impact. oval:org.secpod.oval:def:30930 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly validate crafted data. Successful exploitation allow local users to crash the service. oval:org.secpod.oval:def:30931 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly set limit on the number of processes that could be started by a network connection. Successful exploitation allow a ... oval:org.secpod.oval:def:30932 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly ensure that the screen is locked at the intended time. Successful exploitation allow attackers to obtain access ... oval:org.secpod.oval:def:30933 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly perform glob validation. Successful exploitation allow attackers to crash the service. oval:org.secpod.oval:def:30938 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to parse links. Successful exploitation allow attackers to obtain sensitive information. oval:org.secpod.oval:def:30939 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly perform input validation. Successful exploitation allow attackers to leak sensitive user information. oval:org.secpod.oval:def:30934 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a double free vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation allow attackers to crash the service. oval:org.secpod.oval:def:30935 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a large attachment. Successful exploitation allow attackers to obtain sensitive information by sniffin ... oval:org.secpod.oval:def:30936 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a downgrade attack. Successful exploitation allow local users to obtain cleartext multipeer data. oval:org.secpod.oval:def:30937 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory layout information disclosure vulnerability. A flaw is present in the application, which fails to properly initialize an unspecified data structure. Successful exploitation allow attackers to obtain sens ... oval:org.secpod.oval:def:30920 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allow local users to gain privileges or cause a denial of servi ... oval:org.secpod.oval:def:30921 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allow local users to gain privileges or cause a denial of servi ... oval:org.secpod.oval:def:30922 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an entitlement protection mechanism bypass vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation allow local users to bypass an entitlement prot ... oval:org.secpod.oval:def:30927 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory-layout information disclosure vulnerability. A flaw is present in the application, which fails to properly sanitize outputs from debugging interfaces. Successful exploitation allow local users to determi ... oval:org.secpod.oval:def:30928 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly validate crafted data. Successful exploitation allow local users to crash the service. oval:org.secpod.oval:def:30929 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly validate crafted data. Successful exploitation allow local users to crash the service. oval:org.secpod.oval:def:30923 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a cookie randomization bypass vulnerability. A flaw is present in the application, which fails to properly handle crafted Apple strings employed in the user-space stack-cookie implementation. Successful exploitat ... oval:org.secpod.oval:def:30924 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a TCP connection disruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted header. Successful exploitation allow remote attackers to bypass the sequence-number prote ... oval:org.secpod.oval:def:30925 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a small hop_limit value in a Router Advertisement (RA) message. Successful exploitation allow remote atta ... oval:org.secpod.oval:def:30926 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory-layout information disclosure vulnerability. A flaw is present in the application, which fails to properly initialize an unspecified data structure. Successful exploitation allow local users to obtain se ... oval:org.secpod.oval:def:30960 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow local users to obtain access to keychain items. oval:org.secpod.oval:def:30961 The host is missing a security update according to Apple advisory, APPLE-SA-2015-09-30-3. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to execute arbitrary code, dis ... oval:org.secpod.oval:def:21262 The host is missing a security update according to Apple advisory, APPLE-SA-2014-09-17-3. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle certain objects and security vectors. Successful exploitation allows attackers to execute ... oval:org.secpod.oval:def:31494 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font file. Successful exploitation could allow remote attackers to execute a ... oval:org.secpod.oval:def:31495 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font file. Successful exploitation could allow remote attackers to execute a ... oval:org.secpod.oval:def:31496 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font file. Successful exploitation could allow remote attackers to execute a ... oval:org.secpod.oval:def:31497 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font file. Successful exploitation could allow remote attackers to execute a ... oval:org.secpod.oval:def:31490 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font file. Successful exploitation could allow remote attackers to execute a ... oval:org.secpod.oval:def:31491 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font file. Successful exploitation could allow remote attackers to execute a ... oval:org.secpod.oval:def:31492 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font file. Successful exploitation could allow remote attackers to execute a ... oval:org.secpod.oval:def:31493 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font file. Successful exploitation could allow remote attackers to execute a ... oval:org.secpod.oval:def:31487 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle unused EFI functions. Successful exploitation could allow remote attackers to reach "unu ... oval:org.secpod.oval:def:31488 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted font file. Successful exploitation could allow remote attackers ... oval:org.secpod.oval:def:31489 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font file. Successful exploitation could allow remote attackers to execute a ... oval:org.secpod.oval:def:31483 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted audio file. Successful exploitation could allow remote attackers to execute ... oval:org.secpod.oval:def:31484 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted web site. Successful exploitation could allow remote attackers to execute ar ... oval:org.secpod.oval:def:31485 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted web site. Successful exploitation could allow remote attackers to execute ar ... oval:org.secpod.oval:def:31486 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font file. Successful exploitation could allow remote attackers to execute a ... oval:org.secpod.oval:def:31480 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a NULL pointer dereference vulnerability. A flaw is present in the PHP XSLTProcessor class, which fails to properly handle NULL pointer returned the valuePop() function. Successful exploitat ... oval:org.secpod.oval:def:31481 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted webpage. Successful exploitation could allow remote attackers to ... oval:org.secpod.oval:def:31482 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted audio file. Successful exploitation could allow remote attackers to execute ... oval:org.secpod.oval:def:31476 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unserializing objects. Successful exploitation could allow remote attackers to cause P ... oval:org.secpod.oval:def:31477 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unserializing objects. Successful exploitation could allow remote attackers to cause P ... oval:org.secpod.oval:def:31478 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a denial of service vulnerability. A flaw is present in the PHP Soap client, which incorrectly validate data types. Successful exploitation could allow remote attackers to cause PHP to crash ... oval:org.secpod.oval:def:31479 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a denial of service vulnerability. A flaw is present in the PHP XSLTProcessor class, which fails to properly handle certain data. Successful exploitation could allow remote attackers to caus ... oval:org.secpod.oval:def:31473 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font file. Successful exploitation could allow attackers to execute arbitrar ... oval:org.secpod.oval:def:31474 The host is installed with Apple Mac OS X or Server 10.6.8 through 10.8.x, 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle vectors related to the (1) gethostbyname or (2) gethos ... oval:org.secpod.oval:def:31475 The host is installed with Apple Mac OS X or Server 10.6.8 through 10.8.x, 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to multiple use-after-free vulnerabilities. The flaws are present in the application, which fails to properly handle crafted serialized input containing a (1) R or (2) r ... oval:org.secpod.oval:def:21219 The host is installed with Apple Mac OS X or Server 10.9 through 10.9.4 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted ASCII file that triggers a large amount of backtracking. Successful exploitation allows attackers to ex ... oval:org.secpod.oval:def:31498 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted metadata in an image. Successful exploitation could allow remote attackers to ... oval:org.secpod.oval:def:31499 The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted metadata in an image. Successful exploitation could allow remote attackers to ... oval:org.secpod.oval:def:14174 The host is missing an important security update according to Apple advisory, APPLE-SA-2013-06-04-1. The update is required to fix multiple vulnerabilities. The flaw are present in the application, which fails to handle a crafted application. Successful exploitation could allow attackers to crash th ... oval:org.secpod.oval:def:15487 The host is installed with Apple Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to an unspecified vulnerability. The flaw is present in the PostgreSQL 9.2.x before 9.2.4, 9.1.x before 9.1.9, 9.0.x before 9.0.13, and 8.4.x before 8.4.17, when using OpenSSL, ... oval:org.secpod.oval:def:15488 The host is installed with Apple Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to security bypass vulnerability. The flaw is present in the PostgreSQL 9.2.x before 9.2.4 and 9.1.x before 9.1.9, which does not properly check REPLICATION privileges. Success ... oval:org.secpod.oval:def:15486 The host is installed with Apple Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to argument injection vulnerability. The flaw is present in the in PostgreSQL 9.2.x before 9.2.4, 9.1.x before 9.1.9, and 9.0.x before 9.0.13, which fails to handle a connectio ... oval:org.secpod.oval:def:15494 The host is missing an important security update according to Apple advisory, APPLE-SA-2013-09-12-1. The update is required to fix multiple vulnerabilities. The flaw are present in the application, which fails to handle a crafted application. Successful exploitation could allow attackers to crash th ... oval:org.secpod.oval:def:13781 The host is installed with Apple Mac OS X or Apple Mac OS X Server 10.6.8, 10.7 through 10.7.5, or 10.8 before 10.8.3 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to properly handle URIs with ignorable Unicode character sequences. Successful ... oval:org.secpod.oval:def:13780 The host is installed with Apple Mac OS X or Apple Mac OS X Server 10.6.8, 10.7 through 10.7.5, or 10.8 before 10.8.3 and is prone to a authentication bypass vulnerability. A flaw is present in the application, which fails to properly handle an empty string. Successful exploitation could allow attac ... oval:org.secpod.oval:def:13783 The host is installed with Apple Mac OS X 10.8 before 10.8.3 and is prone to privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle Login Window. Successful exploitation could allow attackers to launch applications at the login Window. oval:org.secpod.oval:def:13782 The host is installed with Apple Mac OS X or Apple Mac OS X Server 10.6.8, 10.7 through 10.7.5, or 10.8 before 10.8.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a crafted website. Successful exploitation could allow a Ja ... oval:org.secpod.oval:def:13785 The host is installed with Apple Mac OS X or Apple Mac OS X Server 10.6.8, 10.7 through 10.7.5, or 10.8 before 10.8.3 and is prone to an use after free vulnerability. A flaw is present in the application, which fails to properly handle ink annotations in PDF files. Successful exploitation could allo ... oval:org.secpod.oval:def:13784 The host is installed with Apple Mac OS X 10.8 before 10.8.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a crafted FaceTime: URL. Successful exploitation could allow attackers to bypass the FaceTime call-confirmation prompt. oval:org.secpod.oval:def:13787 The host is installed with Apple Mac OS X 10.8 before 10.8.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted graphics image. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:13786 The host is installed with Apple Mac OS X Server 10.6.8, 10.7 through 10.7.5 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to prevent plugin loading within the marketing-text WebView. Successful exploitation could allow an attacker to ex ... oval:org.secpod.oval:def:13778 The host is installed with Apple Mac OS X Server 10.6.8, 10.7 through 10.7.5 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle XML parameters. Successful exploitation could allow an attacker to execute arbitrary code. oval:org.secpod.oval:def:13777 The host is installed with Apple Mac OS X or Apple Mac OS X Server 10.6.8, 10.7 through 10.7.5, or 10.8 before 10.8.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle rnet boxes in MP4 files. Successful exploitation could allow att ... oval:org.secpod.oval:def:13779 The host is installed with Apple Mac OS X Server 10.7 through 10.7.5, Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle crafted JSON data. Successful exploitation could ... oval:org.secpod.oval:def:13788 The host is missing a security update according to Apple advisory, APPLE-SA-2013-03-14-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary ... oval:org.secpod.oval:def:13772 The host is installed with Apple Mac OS X or Apple Mac OS X Server 10.6.8, 10.7 through 10.7.5, or 10.8 before 10.8.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted TIFF images. Successful exploitation could allow attacke ... oval:org.secpod.oval:def:13774 The host is installed with Apple Mac OS X Server 10.6.8, 10.7 through 10.7.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted XML value. Successful exploitation allows remote authenticated users to determine the e ... oval:org.secpod.oval:def:13773 The host is installed with Apple Mac OS X Server 10.6.8, 10.7 through 10.7.5 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly restrict access to files and URLs. Successful exploitation allows remote authenticated users to modify data, obt ... oval:org.secpod.oval:def:13776 The host is installed with Apple Mac OS X or Apple Mac OS X Server 10.6.8, 10.7 through 10.7.5, or 10.8 before 10.8.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted TIFF images. Successful exploitation could allow attacke ... oval:org.secpod.oval:def:13775 The host is installed with Apple Mac OS X Server 10.6.8, 10.7 through 10.7.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle dialback result messages. Successful exploitation could allow an attacker to disclose information ... oval:org.secpod.oval:def:4986 The host is installed with Google Chrome before 18.0.1025.142 or Apple Mac OS X 10.6.8, 10.7 through 10.7.5, or 10.8 before 10.8.3 and is prone to cross-site scripting vulnerability. A flaw is present in the applications, which fail to handle the EUC-JP encoding system. Successful exploitation could ... oval:org.secpod.oval:def:4640 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Adobe Flash Player before 9.0.289.0, 10.x before 10.1.102.64 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow remote a ... oval:org.secpod.oval:def:4643 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Adobe Flash Player before 9.0.289.0, 10.x before 10.1.102.64 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow remote a ... oval:org.secpod.oval:def:4644 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Adobe Flash Player before 9.0.289.0, 10.x before 10.1.102.64 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow remote a ... oval:org.secpod.oval:def:4641 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Adobe Flash Player before 9.0.289.0, 10.x before 10.1.102.64 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow remote a ... oval:org.secpod.oval:def:4642 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Adobe Flash Player before 9.0.289.0, 10.x before 10.1.102.64 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow remote a ... oval:org.secpod.oval:def:4647 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors involving nested Standard Encoding Accented Character (aka seac) calls. Successful exploitation could allow remote at ... oval:org.secpod.oval:def:4648 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted BDF font file. Successful exploitation could allow remote attackers to crash the service. oval:org.secpod.oval:def:4645 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Adobe Flash Player before 9.0.289.0, 10.x before 10.1.102.64 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow remote a ... oval:org.secpod.oval:def:4646 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Adobe Flash Player before 9.0.289.0, 10.x before 10.1.102.64 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow remote a ... oval:org.secpod.oval:def:4649 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted IPP request. Successful exploitation could allow remote attackers to crash the service. oval:org.secpod.oval:def:4650 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.289.0, 10.x before 10.1.102.64 or Adobe AIR before 2.0.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful ex ... oval:org.secpod.oval:def:4651 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted Adobe Type 1 Mac Font File. Successful exploitation could allow remote attackers to crash the service. oval:org.secpod.oval:def:4654 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted font file. Successful exploitation could allow remote attackers to crash the service. oval:org.secpod.oval:def:4655 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.280.0, 10.x before 10.1.82.76 or Adobe AIR before 2.0.3and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful expl ... oval:org.secpod.oval:def:4652 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted font file. Successful exploitation could allow remote attackers to crash the service. oval:org.secpod.oval:def:4653 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle negative size values. Successful exploitation could allow remote attackers to crash the service. oval:org.secpod.oval:def:4658 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. ... oval:org.secpod.oval:def:4659 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Succe ... oval:org.secpod.oval:def:4656 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.280.0, 10.x before 10.1.82.76 or Adobe AIR before 2.0.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful ... oval:org.secpod.oval:def:4657 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.280.0, 10.x before 10.1.82.76 or Adobe AIR before 2.0.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful ... oval:org.secpod.oval:def:4625 The host is installed with Adobe Flash Player before 9.0.289.0, 10.x before 10.1.102.64 or Apple Mac OS X 10.5.8 or Apple Mac OS X 10.6 before 10.6.4 and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to handle a Trojan horse dwmapi.dll that is ... oval:org.secpod.oval:def:4626 The host is installed with Apple Mac OS X 10.6 before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted xar archive. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:4624 The host is installed with Apple Mac OS X 10.5.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted embedded Compact Font Format (CFF) font in a document. Successful exploitation could allow attackers to execute arbitrary ... oval:org.secpod.oval:def:4629 The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle XML data. Successful exploitation could allow remote attackers to crash the service. oval:org.secpod.oval:def:4628 The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a maliciously crafted "feed:" URL. Successful exploitation could allow remote attackers to obtain sensitive info ... oval:org.secpod.oval:def:4632 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Adobe Flash Player before 9.0.289.0, 10.x before 10.1.102.64 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow remote a ... oval:org.secpod.oval:def:4633 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Adobe Flash Player before 9.0.289.0, 10.x before 10.1.102.64 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow remote a ... oval:org.secpod.oval:def:4631 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Adobe Flash Player before 9.0.289.0, 10.x before 10.1.102.64 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle crafted SWF content. Successful exploitation could a ... oval:org.secpod.oval:def:4636 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Adobe Flash Player before 9.0.289.0, 10.x before 10.1.102.64 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow remote a ... oval:org.secpod.oval:def:4637 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Adobe Flash Player before 9.0.289.0, 10.x before 10.1.102.64 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow remote a ... oval:org.secpod.oval:def:4634 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Adobe Flash Player before 9.0.289.0, 10.x before 10.1.102.64 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow remote a ... oval:org.secpod.oval:def:4635 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Adobe Flash Player before 9.0.289.0, 10.x before 10.1.102.64 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow remote a ... oval:org.secpod.oval:def:4638 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Adobe Flash Player before 9.0.289.0, 10.x before 10.1.102.64 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow remote a ... oval:org.secpod.oval:def:4639 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Adobe Flash Player before 9.0.289.0, 10.x before 10.1.102.64 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow remote a ... oval:org.secpod.oval:def:2885 The host is installed with Apple iTunes before 10.2 or Apple Safari before 5.0.4 or Apple Mac OS X 10.5.8 or 10.6 through 10.6.4 and is prone to buffer overflow vulnerability. A flaw is present in the application which fails to handle a PNG image that triggers an additional data row. Successful expl ... oval:org.secpod.oval:def:2589 The host is installed with Apple Mac OS X 10.6.x before 10.6.5 or iWork 9.0 through 9.0.5 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to prevent memory corruption. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:2588 The host is installed with Apple Mac OS X 10.5.8 and 10.6.x before 10.6.5 or iWorks 9.0 through 9.0.5 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted office document. Successful exploitation could allow attackers to crash the se ... oval:org.secpod.oval:def:4308 The host is installed with Apple Quicktime before 7.6.9 and Apple Mac OS X 10.6 before 10.6.5 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted jp2 image. Successful exploitation could allow attackers to execute arbitrar ... oval:org.secpod.oval:def:4309 The host is installed with Apple Quicktime before 7.6.9 and Apple Mac OS X 10.6 before 10.6.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted jp2 file. Successful exploitation could allow attackers to execute arbitrary code or ... oval:org.secpod.oval:def:4310 The host is installed with Apple Quicktime before 7.6.9 and Apple Mac OS X 10.6 before 10.6.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted AVI file. Successful exploitation could allow attackers to execute arbitrary code or ... oval:org.secpod.oval:def:4313 The host is installed with Apple Quicktime before 7.6.9 and Apple Mac OS X 10.6 before 10.6.5 and is prone to a integer signedness error vulnerability. A flaw is present in the application, which fails to handle a crafted MPEG movie file. Successful exploitation could allow attackers to execute arbi ... oval:org.secpod.oval:def:4314 The host is installed with Apple Quicktime before 7.6.9 and Apple Mac OS X 10.6 before 10.6.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted Sorenson movie file. Successful exploitation could allow attackers to execute arbitra ... oval:org.secpod.oval:def:4311 The host is installed with Apple Quicktime before 7.6.9 and Apple Mac OS X 10.6 before 10.6.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted movie file. Successful exploitation could allow attackers to execute arbitrary code o ... oval:org.secpod.oval:def:4312 The host is installed with Apple Quicktime before 7.6.9 and Apple Mac OS X 10.6 before 10.6.5 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted MPEG movie file. Successful exploitation could allow attackers to execute arbitrary cod ... oval:org.secpod.oval:def:4315 The host is installed with Apple Quicktime before 7.6.9 and Apple Mac OS X 10.6 before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted FlashPix file. Successful exploitation could allow attackers to execute arbitrary cod ... oval:org.secpod.oval:def:4316 The host is installed with Apple Quicktime before 7.6.9 and Apple Mac OS X 10.6 before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted GIF file. Successful exploitation could allow attackers to execute arbitrary code or ... oval:org.secpod.oval:def:3746 The host is installed with Apple Mac OS X 10.6.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a userspace interruption of an internal function or handler. Successful exploitation could allow attackers to obtain sensitive info ... oval:org.secpod.oval:def:3744 The host is installed with Apple Mac OS X 10.6 through 10.6.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a missing methodName element in the first argument to the xmlrpc_decode_request function. Successful exploitation coul ... oval:org.secpod.oval:def:3748 The host is missing an important security update according to Apple advisory, APPLE-SA-2010-08-24-1. The update is required to fix multiple vulnerabilities. A flaw is present in the application, which fails to properly sanitize user supplied input. Successful exploitation could allow attackers to cr ... oval:org.secpod.oval:def:4683 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a heap memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. ... oval:org.secpod.oval:def:4684 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to an array index error vulnerability. A flaw is present in the application, which fails to handle unspecified types of Adob ... oval:org.secpod.oval:def:4681 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successf ... oval:org.secpod.oval:def:4682 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to handle unspecified vectors. Successful ... oval:org.secpod.oval:def:4688 The host is installed with Apple Mac OS X 10.6 before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a memory management issue. Successful exploitation could allow remote attackers to crash the service. oval:org.secpod.oval:def:4685 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Succe ... oval:org.secpod.oval:def:4689 The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.5 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted RAW image. Successful exploitation could allow remote attackers to crash the service. oval:org.secpod.oval:def:4680 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Succe ... oval:org.secpod.oval:def:4694 The host is installed with Apple Mac OS X 10.5.8 or 10.6.x before 10.6.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a bidirectional text string with ellipsis truncation. Successful exploitation could allow remote attackers to crash ... oval:org.secpod.oval:def:4695 The host is installed with Apple Mac OS X 10.5.8 or 10.6.x before 10.6.5 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle the password-validation functionality in Directory Services. Successful exploitation could allow ... oval:org.secpod.oval:def:4692 The host is installed with Apple Mac OS X 10.6.2 before 10.6.5 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle a crafted image. Successful exploitation could allow remote attackers to crash the service. oval:org.secpod.oval:def:4693 The host is installed with Apple Mac OS X 10.6.x before 10.6.5 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a bidirectional text string with ellipsis truncation. Successful exploitation could allow remote attackers to crash the service. oval:org.secpod.oval:def:4698 The host is installed with Apple Mac OS X 10.5.8 or 10.6.x before 10.6.5 and is prone to a stack based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted PDF document. Successful exploitation could allow remote attackers to execute arbitrary ... oval:org.secpod.oval:def:4699 The host is installed with Apple Mac OS X 10.6.x before 10.6.5 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted website. Successful exploitation could allow remote attackers to set cookies for a partial IP add ... oval:org.secpod.oval:def:4696 The host is installed with Apple Mac OS X 10.5.8 or 10.6.x before 10.6.5 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle errors associated with disabled mobile accounts. Successful exploitation could allow remote attac ... oval:org.secpod.oval:def:4697 The host is installed with Apple Mac OS X 10.5.8 or 10.6.x before 10.6.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font in a PDF document. Successful exploitation could allow remote attackers to execute arbitrary ... oval:org.secpod.oval:def:4690 The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted PSD image. Successful exploitation could allow remote attackers to crash the service. oval:org.secpod.oval:def:4691 The host is installed with Apple Mac OS X 10.6 before 10.6.5 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle a crafted image. Successful exploitation could allow remote attackers to crash the service. oval:org.secpod.oval:def:4661 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Success ... oval:org.secpod.oval:def:4662 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a remote code vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful ... oval:org.secpod.oval:def:4660 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Succe ... oval:org.secpod.oval:def:4665 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Succe ... oval:org.secpod.oval:def:4666 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Succe ... oval:org.secpod.oval:def:4663 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Succe ... oval:org.secpod.oval:def:4664 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Succe ... oval:org.secpod.oval:def:4669 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Succe ... oval:org.secpod.oval:def:4667 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Succe ... oval:org.secpod.oval:def:4668 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to an URL parsing vulnerability. A flaw is present in the application, which fails to handle unspecified vectors related to ... oval:org.secpod.oval:def:4672 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors, relat ... oval:org.secpod.oval:def:4673 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors, relat ... oval:org.secpod.oval:def:4670 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Succe ... oval:org.secpod.oval:def:4671 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Succe ... oval:org.secpod.oval:def:4676 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Succe ... oval:org.secpod.oval:def:4677 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Succe ... oval:org.secpod.oval:def:4674 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow remote attackers to crash the ... oval:org.secpod.oval:def:4675 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Succe ... oval:org.secpod.oval:def:4678 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a heap based buffer vulnerability. A flaw is present in the application, which fails to sanitize malicious input. Success ... oval:org.secpod.oval:def:4679 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Succe ... oval:org.secpod.oval:def:2937 The host is installed with Apple iTunes before 10.2 or Apple Safari 5.0.4 or Apple Mac OS X 10.6.0 through 10.6.4 and is prone to memory leak vulnerability. A flaw is present in the application which fails to handle a PNG image containing malformed Physical Scale (aka sCAL) chunks. Successful exploi ... oval:org.secpod.oval:def:4720 The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.5 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a large ZSIZE value in a black-and-white (aka B/W) RGB image. Successful exploitation could allow remote attackers to cr ... oval:org.secpod.oval:def:4721 The host is installed with Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64; Adobe AIR before 2.0.2.12610; Apple Mac OS X 10.5.8 or 10.6 before 10.6.5 and is prone to an unspecified vulnerability. A flaw is present in the applications, which fail to properly sanitize user supplied inpu ... oval:org.secpod.oval:def:4724 The host is installed with Apple Mac OS X 10.6 before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the applications, which fail to properly handle a crafted XML document. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:4725 The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the applications, which fail to properly handle vectors related to large values in certain inputs. Successful exploitation could allow attackers to execute a ... oval:org.secpod.oval:def:4722 The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the applications, which fail to properly handle a crafted archive. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:4723 The host is installed with Apple Mac OS X 10.6 before 10.6.5 and is prone to a security bypass vulnerability. A flaw is present in the applications, which fail to properly handle a crafted certificate. Successful exploitation could allow attackers to spoof arbitrary SSL servers. oval:org.secpod.oval:def:4728 The host is installed with Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64; Adobe AIR before 2.0.2.12610; Apple Mac OS X 10.5.8 or 10.6 before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the applications, which fail to properly handle a HTTP request ... oval:org.secpod.oval:def:4729 The host is missing a critical security update according to Apple advisory, APPLE-SA-2010-11-10-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly sanitize user supplied input. Successful exploitation could allow attackers to ... oval:org.secpod.oval:def:4726 The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.5 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly handle a crafted URI. Successful exploitation could allow attackers to inject arbitrary web script or HTML. oval:org.secpod.oval:def:4727 The host is installed with Adobe Flash Player before 9.0.277.0 or 10.x before 10.1.53.64, Adobe AIR before 2.0.2.12610, and Adobe Reader 9.x before 9.3.3, and 8.x before 8.2.3 and is prone to a remote code execution vulnerability. A flaw is present in the applications, which fail to handle crafted S ... oval:org.secpod.oval:def:4719 The host is installed with Apple Mac OS X 10.6 before 10.6.5 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted archive that uses LZW compression. Successful exploitation could allow remote attackers to crash the service. oval:org.secpod.oval:def:4700 The host is installed with Apple Mac OS X 10.6.x before 10.6.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted embedded font in a document. Successful exploitation could allow remote attackers to execute arbitrary code ... oval:org.secpod.oval:def:4707 The host is installed with Apple Mac OS X 10.6.x before 10.6.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to verify the unique identifier of its remote AFP volume. Successful exploitation could allow remote attackers to obtain sensitive ... oval:org.secpod.oval:def:4710 The host is installed with Apple Mac OS X 10.5.8 or 10.6.x before 10.6.5 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to handle a large image. Successful exploitation could allow remote attackers to execute arbitrary code or crash the service. oval:org.secpod.oval:def:4713 The host is installed with Apple Mac OS X 10.6.x before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle certain situations in which a client sends no request body. Successful exploitation could allow remote attackers to c ... oval:org.secpod.oval:def:4714 The host is installed with Apple Mac OS X 10.6.x before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a modrdn call with a zero-length RDN destination string. Successful exploitation could allow remote attackers to cras ... oval:org.secpod.oval:def:4711 The host is installed with Apple Mac OS X 10.6.x before 10.6.5 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to handle an arbitrary certificate issued by a legitimate Certification Authority. Successful exploitation could allow remote attackers to b ... oval:org.secpod.oval:def:4712 The host is installed with Apple Mac OS X 10.6.x before 10.6.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle headers in subrequests in certain circumstances involving a parent request that has a body. Successful exploitation coul ... oval:org.secpod.oval:def:4717 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted PNG file. Successful exploitation could allow remote attackers to crash the service. oval:org.secpod.oval:def:4718 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted application. Successful exploitation could allow remote attackers to crash the service. oval:org.secpod.oval:def:4715 The host is installed with Apple Mac OS X 10.6.x before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a modrdn call with an RDN string containing invalid UTF-8 sequences. Successful exploitation could allow remote attac ... oval:org.secpod.oval:def:4716 The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.280.0, 10.x before 10.1.82.76 or Adobe AIR before 2.0.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful exp ... oval:org.secpod.oval:def:10698 The host is installed with Mac OS X 10.6.8 or OS X Lion v10.7 to v10.7.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a %{}C format string. Successful exploitation allows remote attackers to crash the service. oval:org.secpod.oval:def:3840 The host is installed with Apple Mac OS X 10.5.8 and is prone to cross site scripting vulnerability. A flaw is present in the application, which fails to handle a crafted byte sequence before a special character. Successful exploitation could allow attackers to inject arbitrary code. oval:org.secpod.oval:def:3871 The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle the dir and prefix arguments. Successful exploitation could allow context-dependent attackers to bypass safe_mo ... oval:org.secpod.oval:def:3133 The host is installed with Apple Mac OS X 10.6.8 or 10.7 before 10.7.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle Location headers that specify redirection to file: URLs. Successful exploitation could allow attackers to crash ... oval:org.secpod.oval:def:3134 The host is installed with Apple Mac OS X 10.6.8 or 10.7 before 10.7.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to verify the relationships between size arguments and byte string lengths. Successful exploitation could allow attackers to cr ... oval:org.secpod.oval:def:3135 The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.2 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle a large fragment, as demonstrated by a call to audioop.lin2lin with a long string in the first argument. Successful ... oval:org.secpod.oval:def:25306 The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial ... oval:org.secpod.oval:def:30953 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 or Apple iTunes before 12.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted COLLATE clause. Successful exploitation could allow attackers to crash ... oval:org.secpod.oval:def:30954 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 or Apple iTunes before 12.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle via a crafted CHECK clause. Successful exploitation could allow context-dependen ... oval:org.secpod.oval:def:30955 The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 or Apple iTunes before 12.6 and is prone to an integer and stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle large integers in a crafted printf function call in a SEL ... oval:org.secpod.oval:def:17027 The host is installed with Apple Mac OS X or Server 10.7.5, 10.8.5, 10.9 or 10.9.1 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate. Success ... oval:org.secpod.oval:def:17037 The host is missing a security update according to Apple advisory, APPLE-SA-2014-02-25-1. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fail to handle certain vectors related to memory and crafted data. Successful exploitation allows attacke ... oval:org.secpod.oval:def:3845 The host is installed with Apple Mac OS X before 10.6.3 and is prone to a nil credentials authentication bypass vulnerability. A flaw is present in the application, which fails to properly handle an invalid username without a password. Successful exploitation could allow attackers to bypass authenti ... oval:org.secpod.oval:def:3820 The host is installed with Apple Mac OS X before 10.6.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle vectors related to the embedding of these commands in the Authorization HTTP header. Successful exploitation could allow attac ... oval:org.secpod.oval:def:3869 The host is missing an important security update according to Apple advisory, APPLE-SA-2010-03-29-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly sanitize user supplied input. Successful exploitation could allow attackers t ... oval:org.secpod.oval:def:3514 The host is installed with Apple Mac OS X 10.5.8 or 10.6.2 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the application, which fail to sanitize user supplied input. Successful exploitation could allow attackers to execute arbitrary code, crash the service or c ... oval:org.secpod.oval:def:3506 The host is installed with Apple Mac OS X 10.5.8 or 10.6.2 and is prone to an man-in-the-middle vulnerability. A flaw is present in the applications, which fail to handle properly associate renegotiation handshakes with an existing connection. Successful exploitation could allow attackers to attacke ... oval:org.secpod.oval:def:10714 The host is installed with Mac OS X 10.6.8 or 10.7 before 10.7.5 or 10.8.x before 10.8.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly process the complete cleartext password if this password contains a 0x80 character. Successf ... oval:org.secpod.oval:def:10725 The host is installed with Apple Mac OS X 10.6.8, 10.7 before 10.7.5 or 10.8 before 10.8.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:62181 The host is missing a security update according to Apple advisory, APPLE-SA-2020-03-24-2. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows remote attackers to execute arbitrary code or ... oval:org.secpod.oval:def:62204 The host is installed with Apple Mac OS X 10.15.3 and is prone to an arbitrary command execution vulnerability. A flaw is present in the application, which fails to properly handle a issue in sudo command. Successful exploitation allows an attacker to run commands as a non-existent user. oval:org.secpod.oval:def:34616 The host is missing a security update according to Apple advisory, APPLE-SA-2016-05-16-4. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to caus ... oval:org.secpod.oval:def:34680 The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to cause unspecified impact. oval:org.secpod.oval:def:2880 The host is missing an update according to Apple advisory APPLE-SA-2011-06-23-1. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fail to handle malicious input. Successful exploitation could allow attackers to execute arbitrary code, gain sens ... oval:org.secpod.oval:def:3872 The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly recognize the safe_mode_include_dir directive. Successful exploitation could allow attackers bypass open_basedir restr ... oval:org.secpod.oval:def:60011 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle the parsing of a maliciously crafted XML file. Successful exploitation allows an attacker ... oval:org.secpod.oval:def:59966 The host is missing a security update according to Apple advisory, APPLE-SA-2019-12-10-3. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows remote attackers to execute arbitrary code or ... |