[Forgot Password]
Login  Register Subscribe

24003

 
 

131517

 
 

106904

 
 

909

 
 

84902

 
 

134

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:25277
This settings determines whether to audit the event of a user who attempts to access an object that has a specified system access control list (SACL), effectively enabling auditing to take place. It is targeted to File and Folders object access processes.

oval:org.secpod.oval:def:25278
This security setting determines whether to audit the event of a user accessing an object for example, a file, folder, registry key, printer, and so forth--that has its own system access control list (SACL) specified. If you define this policy setting, you can specify whether to audit successes, aud ...

oval:org.secpod.oval:def:7578
The host is installed with Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Libraries. Successful exploitation allows remote attackers to affect integrity.

oval:org.secpod.oval:def:7584
The host is installed with Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related Swing. Successful exploitation allows attackers to affect confidentiality, integrity, and availability.

oval:org.secpod.oval:def:7574
The host is installed with Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Libraries. Successful exploitation allows remote attackers to affect confidentiality, integrity, and availability ...

oval:org.secpod.oval:def:7576
The host is installed with Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to JMX. Successful exploitation allows attackers to affect confidentiali ...

oval:org.secpod.oval:def:7572
The host is installed with Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Libraries. Successful exploitation allows remote attackers to affect confidentiality.

oval:org.secpod.oval:def:7573
The host is installed with Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Hotspot. Successful exploitation allows attackers to affect confidentiality and integrity.

oval:org.secpod.oval:def:7569
The host is installed with Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to deployment. Successful exploitation allows attackers to affect confidentiality, integrity, and availability.

oval:org.secpod.oval:def:7568
The host is installed with Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to deployment. Successful exploitation allows attackers to affect confidentiality, integrity, and availability.

oval:org.secpod.oval:def:7580
The host is installed with Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Security. Successful exploitation allows attackers to affect confidentiality.

oval:org.secpod.oval:def:7579
The host is installed with Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to JMX. Successful exploitation allows attackers to affect confidentiali ...

oval:org.secpod.oval:def:7585
The host is installed with Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Beans. Successful exploitation allows attackers to affect confidentiality, integrity, and availability.

oval:org.secpod.oval:def:7575
The host is installed with Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Concurrency. Successful exploitation allows remote attackers to affect confidentiality and integrity.

oval:org.secpod.oval:def:7571
The host is installed with Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to deployment. Successful exploitation allows attackers to affect confidentiality, integrity, and availability.

oval:org.secpod.oval:def:7586
The host is installed with Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to JMX. Successful exploitation allows attackers to affect confidentiality, availability and integrity.

oval:org.secpod.oval:def:7570
The host is installed with Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 35 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to JMX. Successful exploitation allows attackers to affect confidentiality, integri ...

oval:org.secpod.oval:def:7581
The host is installed with Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Libraries. Successful exploitation allows remote attackers to affect integrity.

oval:org.secpod.oval:def:7577
The host is installed with Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Security. Successful exploitation allows attackers to affect confidentiality.

oval:org.secpod.oval:def:2274
Apple Mac OS X is installed

oval:org.secpod.oval:def:13780
The host is installed with Apple Mac OS X or Apple Mac OS X Server 10.6.8, 10.7 through 10.7.5, or 10.8 before 10.8.3 and is prone to a authentication bypass vulnerability. A flaw is present in the application, which fails to properly handle an empty string. Successful exploitation could allow attac ...

oval:org.secpod.oval:def:13777
The host is installed with Apple Mac OS X or Apple Mac OS X Server 10.6.8, 10.7 through 10.7.5, or 10.8 before 10.8.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle rnet boxes in MP4 files. Successful exploitation could allow att ...

oval:org.secpod.oval:def:13774
The host is installed with Apple Mac OS X Server 10.6.8, 10.7 through 10.7.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted XML value. Successful exploitation allows remote authenticated users to determine the e ...

oval:org.secpod.oval:def:13773
The host is installed with Apple Mac OS X Server 10.6.8, 10.7 through 10.7.5 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly restrict access to files and URLs. Successful exploitation allows remote authenticated users to modify data, obt ...

oval:org.secpod.oval:def:13776
The host is installed with Apple Mac OS X or Apple Mac OS X Server 10.6.8, 10.7 through 10.7.5, or 10.8 before 10.8.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted TIFF images. Successful exploitation could allow attacke ...

oval:org.secpod.oval:def:13775
The host is installed with Apple Mac OS X Server 10.6.8, 10.7 through 10.7.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle dialback result messages. Successful exploitation could allow an attacker to disclose information ...

oval:org.secpod.oval:def:10708
The host is installed with Mac OS X 10.8.x before 10.8.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted application from reading passwords entered into Login Window. Successful exploitation could allow attackers to read ...

oval:org.secpod.oval:def:10709
The host is installed with Mac OS X 10.6.8 or OS X Lion v10.7 to v10.7.4 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle an e-mail message that triggers the loading of a third-party plugin. Successful exploitation could allow att ...

oval:org.secpod.oval:def:10702
The host is installed with Mac OS X Lion v10.7 to v10.7.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted text glyph. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

oval:org.secpod.oval:def:10703
The host is installed with Mac OS X 10.6.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to perform proper bounds checking. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

oval:org.secpod.oval:def:10716
The host is installed with Mac OS X 10.6.8 or 10.7 before 10.7.5 or 10.8.x before 10.8.2 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted tar file. Successful exploitation allows remote attackers to cause a denial of service or pos ...

oval:org.secpod.oval:def:10719
The host is installed with OS X Lion v10.7 to v10.7.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly perform authentication for the Device Management private interface. Successful exploitation could allow attackers to enumerate ...

oval:org.secpod.oval:def:10710
The host is installed with Mac OS X 10.8.x before 10.8.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to create password hash only when mobile account is used as an external account. Successful exploitation could allow attackers to obtain ...

oval:org.secpod.oval:def:10714
The host is installed with Mac OS X 10.6.8 or 10.7 before 10.7.5 or 10.8.x before 10.8.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly process the complete cleartext password if this password contains a 0x80 character. Successf ...

oval:org.secpod.oval:def:10720
The host is installed with Mac OS X 10.6.8 or 10.7 before 10.7.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted .pict file. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service ...

oval:org.secpod.oval:def:10721
The host is installed with Mac OS X 10.6.8 or 10.7 before 10.7.5 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted sean atom in a movie file. Successful exploitation allows remote attackers to execute arbitrary code or cause a de ...

oval:org.secpod.oval:def:10722
The host is installed with Mac OS X 10.6.8 or 10.7 before 10.7.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted movie file with Sorenson encoding. Successful exploitation allows remote attackers to execute arbitrary code or ca ...

oval:org.secpod.oval:def:10723
The host is installed with Mac OS X 10.6.8 or 10.7 before 10.7.5 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted movie file with RLE encoding. Successful exploitation allows remote attackers to execute arbitrary code or cause a d ...

oval:org.secpod.oval:def:10724
The host is installed with Mac OS X 10.7 before 10.7.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle USB hub descriptors. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

oval:org.secpod.oval:def:21726
The host is installed with Apple Mac OS X or Server 10.10.x before 10.10.2 and is prone to information disclosure vulnerability. A flaw is present in the application, which does not properly clear the browsing cache upon a transition out of private-browsing mode. Successful exploitation allows attac ...

oval:org.secpod.oval:def:21723
The host is installed with Apple Mac OS X or Server before 10.10.1 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to obtain sensitive information.

oval:org.secpod.oval:def:21724
The host is installed with Apple Mac OS X or Server before 10.10.1 and is prone to information disclosure vulnerability. A flaw is present in the "System Profiler About This Mac", which fails to properly handle unspecified vectors. Successful exploitation allows attackers to obtain sensitive informa ...

oval:org.secpod.oval:def:21722
The host is missing a security update according to Apple advisory, APPLE-SA-2014-11-17-2. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle certain vectors. Successful exploitation allows attackers to execute remote code or obtain ...

oval:org.secpod.oval:def:14170
The host is installed with Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to processes certain queries by converting hash keys to symbols. Successful exploitation could allow an attack ...

oval:org.secpod.oval:def:14171
The host is installed with Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which does not properly handle \n (newline) characters. Successful exploitation could allow an attacker to execute arbitra ...

oval:org.secpod.oval:def:14172
The host is installed with Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which does not properly restrict the capabilities of the XML parser. Successful exploitation could allow an attacker to ex ...

oval:org.secpod.oval:def:14173
The host is installed with Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which does not properly handle encoded : (colon) characters in URLs. Successful exploitation could allow an attacker to ...

oval:org.secpod.oval:def:21769
The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a web site that triggers an uncaught SafariNotificationAgent exception by providing a crafted Push Notification. Su ...

oval:org.secpod.oval:def:21767
The host is installed with Apple Mac OS X or Server before 10.10 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an application that makes crafted IOKit function calls. Successful exploitation allows attackers to obtain se ...

oval:org.secpod.oval:def:21768
The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted call. Successful exploitation allows attackers to cause a denial of service (out-of-bounds read and devic ...

oval:org.secpod.oval:def:21765
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9 through 10.9.5 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle an application that provides crafted key-mapping properties. Successful exploitation allows ...

oval:org.secpod.oval:def:21766
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9 through 10.9.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an application that provides crafted key-mapping properties. Successful exploitation allows attacker ...

oval:org.secpod.oval:def:21763
The host is installed with Apple Mac OS X or Server before 10.10 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle an application that provides crafted values in unspecified metadata fields. Successful exploitation allows ...

oval:org.secpod.oval:def:21764
The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not properly handle incomplete resource envelopes in signed bundles. Successful exploitation allows attackers to bypass intended app-auth ...

oval:org.secpod.oval:def:21772
The host is installed with Apple Mac OS X or Server 10.9.5 or earlier and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle an unspecified command to one interface. Successful exploitation allows attackers to discover the network addresses of al ...

oval:org.secpod.oval:def:21770
The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a user-space process to observe data related to the random numbers. Successful exploitation allows attackers to bypas ...

oval:org.secpod.oval:def:21771
The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not properly enforce the "require password after sleep or screen saver begins" setting. Successful exploitation allows attackers to obtai ...

oval:org.secpod.oval:def:21758
The host is installed with Apple Mac OS X or Server 10.8, 10.9 or before 10.10.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to obtain sensitive memory-co ...

oval:org.secpod.oval:def:21759
The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to cause a denial of service (NULL pointer derefere ...

oval:org.secpod.oval:def:21756
The host is installed with Apple Mac OS X or Server 10.8, 10.9 or before 10.10.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to obtain sensitive memory-co ...

oval:org.secpod.oval:def:21757
The host is installed with Apple Mac OS X or Server 10.8, 10.9 or before 10.10.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to obtain sensitive memory-co ...

oval:org.secpod.oval:def:21754
The host is installed with Apple Mac OS X or Server before 10.10 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted Wi-Fi AP. Successful exploitation allows attackers to calculate credentials by offering LEAP authen ...

oval:org.secpod.oval:def:21755
The host is installed with Apple Mac OS X or Server before 10.10.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to obtain sensitive memory-content and memo ...

oval:org.secpod.oval:def:21753
The host is installed with Apple Mac OS X or Server before 10.10 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle crafted audio samples in an m4a file. Successful exploitation allows attackers to execute arbitrary code or ...

oval:org.secpod.oval:def:21761
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9 through 10.9.5 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to execute arbitrary code in ...

oval:org.secpod.oval:def:21762
The host is installed with Apple Mac OS X or Server before 10.10 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle an application that provides crafted values in unspecified metadata fields. Successful exploitation allows ...

oval:org.secpod.oval:def:21760
The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a double free vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Mach ports. Successful exploitation allows attackers to gain privileges or cause a denial of service ( ...

oval:org.secpod.oval:def:21747
The host is installed with Apple Mac OS X or Server 10.9.5 or earlier and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle crafted ICMPv6 packets. Successful exploitation allows attackers to denial of service (CPU consumption).

oval:org.secpod.oval:def:21748
The host is installed with Apple Mac OS X or Server before 10.10 and is prone to an information disclosure vulnerability. A flaw is present in the application, which does not clear the back/forward history of an open tab. Successful exploitation allows attackers to obtain sensitive information.

oval:org.secpod.oval:def:21751
The host is installed with Apple Mac OS X or Server before 10.10 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a symlink attack. Successful exploitation allows attackers to execute arbitrary code with system privileges ...

oval:org.secpod.oval:def:15487
The host is installed with Apple Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to an unspecified vulnerability. The flaw is present in the PostgreSQL 9.2.x before 9.2.4, 9.1.x before 9.1.9, 9.0.x before 9.0.13, and 8.4.x before 8.4.17, when using OpenSSL, ...

oval:org.secpod.oval:def:14157
The host is installed with Apple Mac OS X Server 10.6.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted request. Successful exploitation could allow an attacker to execute arbitrary code.

oval:org.secpod.oval:def:15488
The host is installed with Apple Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to security bypass vulnerability. The flaw is present in the PostgreSQL 9.2.x before 9.2.4 and 9.1.x before 9.1.9, which does not properly check REPLICATION privileges. Success ...

oval:org.secpod.oval:def:15485
The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to buffer overflow vulnerability. The flaw is present in the in the php_quot_print_encode function in ext/standard/quot_print.c in PHP before 5. ...

oval:org.secpod.oval:def:14155
The host is installed with OS X Mountain Lion 10.8 through 10.8.3 is prone to Privelege escalation vulnerability. A flaw is present in the application, which allows local users in the lpadmin group to read or write arbitrary files. Successful exploitation could allow an attacker to execute arbitrary ...

oval:org.secpod.oval:def:15486
The host is installed with Apple Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to argument injection vulnerability. The flaw is present in the in PostgreSQL 9.2.x before 9.2.4, 9.1.x before 9.1.9, and 9.0.x before 9.0.13, which fails to handle a connectio ...

oval:org.secpod.oval:def:15489
The host is installed with Apple Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to unspecified vulnerability. The flaw is present in the PostgreSQL, 9.2.x before 9.2.4, 9.1.x before 9.1.9, 9.0.x before 9.0.13, 8.4.x before 8.4.17, and 8.3.x before 8.3.23, ...

oval:org.secpod.oval:def:14159
The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.2 and is prone to buffer overflow vulnerability. A flaw is present in the application which fails to handle a crafted PICT image. Successful exploitation could allow a ...

oval:org.secpod.oval:def:15480
The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to denial of service vulnerability.The flaw is present in the OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d, which fails t ...

oval:org.secpod.oval:def:15483
The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to an unspecified vulnerability. The flaw is present in the the SOAP parser in PHP before 5.3.22 and 5.4.x before 5.4.13, which fails to handle ...

oval:org.secpod.oval:def:15484
The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to arbitrary file disclosure vulnerability. The flaw is present in the the SOAP parser in PHP before 5.3.22 and 5.4.x before 5.4.12, which fails ...

oval:org.secpod.oval:def:14150
The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.3, Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to information disclosure vulnerability. A flaw is present in the application, which does not pro ...

oval:org.secpod.oval:def:15482
The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to an unspecified vulnerability. The flaw is present in the ext/soap/soap.c in PHP before 5.3.22 and 5.4.x before 5.4.13, which does not validat ...

oval:org.secpod.oval:def:14167
The host is installed with OS X Mountain Lion 10.8 through 10.8.3 is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted MP3 file . Successful exploitation could allow an attacker to execute arbitrary code.

oval:org.secpod.oval:def:14168
The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.3 and is prone to remote code execution vulnerability.A flaw is present in the application which fails to handle unspecified vectors . Successful exploitation could al ...

oval:org.secpod.oval:def:14165
The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.3, Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a a c ...

oval:org.secpod.oval:def:14166
The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.3, Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle a craft ...

oval:org.secpod.oval:def:14169
The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.3 and is prone to denial of service vulnerability . A flaw is present in the application, which does not properly initialize memory during the processing of text track ...

oval:org.secpod.oval:def:15490
The host is installed with Apple Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to password disclosure vulnerability. The flaw is present in the PostgreSQL, possibly 9.2.x before 9.2.4, 9.1.x before 9.1.9, 9.0.x before 9.0.13, 8.4.x before 8.4.17, and 8.3. ...

oval:org.secpod.oval:def:14160
The host is installed with OS X Mountain Lion 10.8 through 10.8.3 and is prone to information disclosure vulnerability. A flaw is present in the application, which does not prevent storage of permanent cookies. Successful exploitation could allow an attacker to execute arbitrary code.

oval:org.secpod.oval:def:15491
The host is installed with Apple Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to security bypass vulnerability. The flaw is present in the Power Management in Apple Mac OS X before 10.8.5, which does not properly perform locking upon occurrences of a power assertion. Successful exploitati ...

oval:org.secpod.oval:def:14163
The host is installed with OS X Mountain Lion 10.8 through 10.8.3 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly authenticate attempts to disable FileVault. Successful exploitation could allow an attacker to execute arbitrary code.

oval:org.secpod.oval:def:14164
The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.3, Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle cra ...

oval:org.secpod.oval:def:14161
The host is installed with OS X Mountain Lion 10.8 through 10.8.3 and is prone to stack consumption vulnerability. A flaw is present in the application which fails to properly handle text glyphs. Successful exploitation could allow an attacker to execute arbitrary code.

oval:org.secpod.oval:def:15492
The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to denial of service vulnerability. The flaw is present in the QuickTime in Apple Mac OS X before 10.8.5, which fails to handle a crafted idsc a ...

oval:org.secpod.oval:def:14162
The host is installed with Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to directory service vulnerability. A flaw is present in the application which doesn't handle directory server's messages from the network. Successful exploitation could allow an attacker to execute arbitra ...

oval:org.secpod.oval:def:15493
The host is installed with Apple Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to security bypass vulnerability. The flaw is present in the Screen Lock in Apple Mac OS X before 10.8.5 , which does not properly track sessions. Successful exploitation allows remote authenticated users to byp ...

oval:org.secpod.oval:def:15465
The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to cross site scripting vulnerability. The flaw is present in the balancer_handler function in the manager interface in mod_proxy_balancer.c in ...

oval:org.secpod.oval:def:15466
The host is installed with Apple Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to denial of service vulnerability. The flaw is present in the ISC BIND 9.4.x, 9.5.x, 9.6.x, and 9.7.x before 9.7.6-P2; 9.8.x before 9.8.3-P2; 9.9.x before 9.9.1-P2; and 9.6-ES ...

oval:org.secpod.oval:def:15463
The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to information disclosure vulnerability .The flaw is present in the in the make_variant_list function in mod_negotiation.c in the mod_negotiatio ...

oval:org.secpod.oval:def:15464
The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to multiple cross site scripting vulnerabilities .The flaw is present in the application, which fails. Successful exploitation could allow atta ...

oval:org.secpod.oval:def:15469
The host is installed with Apple Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to denial of service vulnerability. The flaw is present in the ISC BIND 9.8.x before 9.8.4-P1 and 9.9.x before 9.9.2-P1, when DNS64 is enabled, which fails to handle a crafted ...

oval:org.secpod.oval:def:15467
The host is installed with Apple Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to denial of service vulnerability. The flaw is present in the ISC BIND 9.x before 9.7.6-P3, 9.8.x before 9.8.3-P3, 9.9.x before 9.9.1-P3, and 9.4-ESV and 9.6-ESV before 9.6-ES ...

oval:org.secpod.oval:def:15468
The host is installed with Apple Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to denial of service vulnerability. The flaw is present in the ISC BIND 9.x before 9.7.6-P4, 9.8.x before 9.8.3-P4, 9.9.x before 9.9.1-P4, and 9.4-ESV and 9.6-ESV before 9.6-ES ...

oval:org.secpod.oval:def:14145
The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.3, Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to information disclosure vulnerability. A flaw is present in the application, which performs a M ...

oval:org.secpod.oval:def:15476
The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to information disclosure vulnerability. The flaw is present in the The IPSec implementation in Apple Mac OS X before 10.8.5, when Hybrid Auth i ...

oval:org.secpod.oval:def:14146
The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.3, Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to information disclosure vulnerability. A flaw is present in the application, which performs a M ...

oval:org.secpod.oval:def:15477
The host is installed with Apple Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to denial of service vulnerability. The flaw is present in the the kernel in Apple Mac OS X before 10.8.5, which fails to handle crafted IGMP packets that leverage incorrect, extraneous code in the IGMP parser. ...

oval:org.secpod.oval:def:14143
The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.3, Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to information disclosure vulnerability. A flaw is present in the application, which does not ini ...

oval:org.secpod.oval:def:15474
The host is installed with Apple Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to buffer overflow vulnerability. The flaw is present in ImageIO in Apple Mac OS X before 10.8.5, which fails to handle crafted JPEG2000 data in a PDF document. Successful exploitation allows remote attackers to ...

oval:org.secpod.oval:def:14144
The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.3, Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to information disclosure vulnerability. A flaw is present in the application, which does not ens ...

oval:org.secpod.oval:def:15475
The host is installed with Apple Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to security-bypass vulnerability. The flaw is present in the Installer in Apple Mac OS X before 10.8.5 provides an option to continue a package's installation after encounterin ...

oval:org.secpod.oval:def:14149
The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.3, Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to information disclosure vulnerability. A flaw is present in the application, which does not pro ...

oval:org.secpod.oval:def:14147
The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.3, Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to information disclosure vulnerability. A flaw is present in the application, which does not pro ...

oval:org.secpod.oval:def:15478
The host is installed with Apple Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to information disclosure vulnerability. The flaw is present in the mdmclient in Mobile Device Management in Apple Mac OS X before 10.8.5, which places a password on the comman ...

oval:org.secpod.oval:def:14148
The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.3, Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to pro ...

oval:org.secpod.oval:def:15479
The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to denial of service vulnerability. The flaw is present in the crypto/evp/e_aes_cbc_hmac_sha1.c in the AES-NI functionality in the TLS 1.1 and 1 ...

oval:org.secpod.oval:def:15472
The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5 and is prone to remote code execution vulnerability. The flaw is present in pdf.c in ClamAV 0.97.1 through 0.97.7, which fails to handle a crafted length value in an encrypted PDF file. Successful expl ...

oval:org.secpod.oval:def:14142
The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.3, Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to pro ...

oval:org.secpod.oval:def:15473
The host is installed with Apple Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to buffer overflow vulnerability. The flaw is present in CoreGraphics in Apple Mac OS X before 10.8.5, which fails to handle crafted JBIG2 data in a PDF document. Successful exploitation allows remote attackers ...

oval:org.secpod.oval:def:15470
The host is installed with Apple Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to denial of service vulnerability. The flaw is present in the libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before ...

oval:org.secpod.oval:def:15471
The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5 and is prone to remote code execution vulnerability. The flaw is present in the Integer underflow in the cli_scanpe function in pe.c in ClamAV before 0.97.8, which fails to handle a skewed offset large ...

oval:org.secpod.oval:def:13781
The host is installed with Apple Mac OS X or Apple Mac OS X Server 10.6.8, 10.7 through 10.7.5, or 10.8 before 10.8.3 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to properly handle URIs with ignorable Unicode character sequences. Successful ...

oval:org.secpod.oval:def:13783
The host is installed with Apple Mac OS X 10.8 before 10.8.3 and is prone to privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle Login Window. Successful exploitation could allow attackers to launch applications at the login Window.

oval:org.secpod.oval:def:13782
The host is installed with Apple Mac OS X or Apple Mac OS X Server 10.6.8, 10.7 through 10.7.5, or 10.8 before 10.8.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a crafted website. Successful exploitation could allow a Ja ...

oval:org.secpod.oval:def:13785
The host is installed with Apple Mac OS X or Apple Mac OS X Server 10.6.8, 10.7 through 10.7.5, or 10.8 before 10.8.3 and is prone to an use after free vulnerability. A flaw is present in the application, which fails to properly handle ink annotations in PDF files. Successful exploitation could allo ...

oval:org.secpod.oval:def:13784
The host is installed with Apple Mac OS X 10.8 before 10.8.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a crafted FaceTime: URL. Successful exploitation could allow attackers to bypass the FaceTime call-confirmation prompt.

oval:org.secpod.oval:def:13787
The host is installed with Apple Mac OS X 10.8 before 10.8.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted graphics image. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:13786
The host is installed with Apple Mac OS X Server 10.6.8, 10.7 through 10.7.5 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to prevent plugin loading within the marketing-text WebView. Successful exploitation could allow an attacker to ex ...

oval:org.secpod.oval:def:21355
The host is installed with Apple Mac OS X or Server 10.7 through 10.7.5, 10.8 through 10.8.5 or 10.9 through 10.9.5 and is prone to arbitrary code execution vulnerability. A flaw is present in the Bash's parsing of environment variables, which fails to properly handle a crafted environment. Successf ...

oval:org.secpod.oval:def:14277
The host is installed with Apple Mac OS X 10.8.x and is prone to security bypass vulnerability. The flaw is present in the fill_pipeinfo function in bsd/kern/sys_pipe.c in the XNU kernel, which does not properly handle PROC_PIDFDPIPEINFO option to the proc_info system call for a kernel pipe handle. ...

oval:org.secpod.oval:def:14278
The host is installed with Apple Mac OS X 10.8.x and is prone to security bypass vulnerability. The flaw is present in the posix_spawn system call in the XNU kernel, which does not prevent use of the _POSIX_SPAWN_DISABLE_ASLR and _POSIX_SPAWN_ALLOW_DATA_EXEC flags for setuid and setgid programs. Su ...

oval:org.secpod.oval:def:14275
The host is installed with Apple Mac OS X 10.8.x and is prone to information disclosure vulnerability. The flaw is present in the posix_spawn system call in the XNU kernel, which does not properly validate the data for file actions and port actions. Successful exploitation allows local users to caus ...

oval:org.secpod.oval:def:14276
The host is installed with Apple Mac OS X 10.8.x and is prone to information disclosure vulnerability. The flaw is mach_port_space_info function in osfmk/ipc/mach_debug.c in the XNU kernel, which does not initialize a certain structure member. Successful exploitation allows local users to obtain sen ...

oval:org.secpod.oval:def:14259
The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4, and is prone to buffer overflow vulnerability. The flaw is present in the QuickTime, which fails to handle a crafted movie file with Sorenson encoding. Succ ...

oval:org.secpod.oval:def:14262
The host is missing an important security update according to Apple advisory, APPLE-SA-2013-07-02-1. The update is required to fix multiple vulnerabilities. The flaws are present in the QuickTime, which fails to handle a crafted movie file. Successful exploitation could allow attackers to crash the ...

oval:org.secpod.oval:def:14260
The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4, and is prone to buffer overflow vulnerability. The flaw is present in the QuickTime, which fails to handle a crafted movie file with H.264 encoding. Success ...

oval:org.secpod.oval:def:14261
The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4, and is prone to buffer overflow vulnerability. The flaw is present in the QuickTime, which fails to handle crafted mvhd atoms in a movie file. Successful ex ...

oval:org.secpod.oval:def:20179
The host is installed with Apple Mac OS X or Server 10.8 through 10.8.5 or OS X 10.9 through 10.9.3 and is prone to uninitialized memory access vulnerability. The flaw is present in the application, which fails to properly handle DTLS messages in a TLS connection. Successful exploitation allows atta ...

oval:org.secpod.oval:def:20180
The host is installed with Apple Mac OS X or Server 10.9 through 10.9.3 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle iBooks logs. Successful exploitation allows an attacker with access to a system may be able to recover Apple ID cred ...

oval:org.secpod.oval:def:20181
The host is installed with Apple Mac OS X or Server 10.9 through 10.9.3 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly handle IOKit object. Successful exploitation allows an attacker bypass kernel address space layout randomization.

oval:org.secpod.oval:def:20188
The host is installed with Apple Mac OS X or Server 10.9 through 10.9.3 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly kernel pointer stored in an IOKit object. Successful exploitation allows an attacker bypass kernel address space layout ...

oval:org.secpod.oval:def:20186
The host is installed with Apple Mac OS X or Server 10.9 through 10.9.3 and is prone to heap buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle log messages. Successful exploitation allows local user to execute arbitrary code with system privileges.

oval:org.secpod.oval:def:20187
The host is installed with Apple Mac OS X or Server 10.9 through 10.9.3 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to properly handle launchd. Successful exploitation allows local user to execute arbitrary code with system privileges.

oval:org.secpod.oval:def:20184
The host is installed with Apple Mac OS X or Server 10.9 through 10.9.3 and is prone to integer underflow vulnerability. A flaw is present in the application, which fails to properly handle launchd. Successful exploitation allows local user to execute arbitrary code with system privileges.

oval:org.secpod.oval:def:20185
The host is installed with Apple Mac OS X or Server 10.9 through 10.9.3 and is prone to heap buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle IPC messages. Successful exploitation allows local user to execute arbitrary code with system privileges.

oval:org.secpod.oval:def:20182
The host is installed with Apple Mac OS X or Server 10.9 through 10.9.3 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly handle keystrokes. Successful exploitation could have allowed an attacker to type into windows under the screen lock.

oval:org.secpod.oval:def:20183
The host is installed with Apple Mac OS X or Server 10.9 through 10.9.3 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle IOKit API arguments. Successful exploitation allows local user to cause an unexpected system restart.

oval:org.secpod.oval:def:20177
The host is installed with Apple Mac OS X or Server 10.8 through 10.8.5 or OS X 10.9 through 10.9.3 and is prone to multiple null dereference vulnerabilities. The flaws is present in the application, which fails to properly handle kernel graphics drivers. Successful exploitation allows attackers to ...

oval:org.secpod.oval:def:20178
The host is installed with Apple Mac OS X or Server 10.9 through 10.9.3 and is prone to arbitrary code execution vulnerability. The flaw is present in the application, which fails to properly handle IOThunderBoltController API calls. Successful exploitation allows execute arbitrary code with system ...

oval:org.secpod.oval:def:20175
The host is installed with Apple Mac OS X or Server 10.8 through 10.8.5 or OS X 10.9 through 10.9.3 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle IOAcceleratorFamily. Successful exploitation allows attackers to execute ar ...

oval:org.secpod.oval:def:20176
The host is installed with Apple Mac OS X or Server 10.8 through 10.8.5 or OS X 10.9 through 10.9.3 and is prone to out-of-bounds vulnerability. A flaw is present in the application, which fails to properly handle a system call. Successful exploitation allows local user to bypass kernel address spac ...

oval:org.secpod.oval:def:20173
The host is installed with Apple Mac OS X or Server 10.8 through 10.8.5 or OS X 10.9 through 10.9.3 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle OpenGL API call. Successful exploitation allows attackers to execute arbitr ...

oval:org.secpod.oval:def:20174
The host is installed with Apple Mac OS X or Server 10.8 through 10.8.5 or OS X 10.9 through 10.9.3 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle OpenCL API call. Successful exploitation allows attackers to bypass kernel ...

oval:org.secpod.oval:def:20171
The host is installed with Apple Mac OS X or Server 10.7 through 10.7.5, OS X 10.8 through 10.8.5 or OS X 10.9 through 10.9.3 and is prone to out-of-bounds vulnerability. A flaw is present in the application, which fails to properly handle AppleDouble files in zip archives. Successful exploitation m ...

oval:org.secpod.oval:def:20172
The host is installed with Apple Mac OS X or Server 10.7 through 10.7.5, OS X 10.8 through 10.8.5 or OS X 10.9 through 10.9.3 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle Dock's messages from applications. Successful exp ...

oval:org.secpod.oval:def:16091
The host is missing an important security update according to Apple advisory, APPLE-SA-2013-10-03-1. The update is required to fix security bypass vulnerability. The flaw is present in the Directory Services, which fails to handle a crafted application. Successful exploitation allows local users to ...

oval:org.secpod.oval:def:16092
The host is installed with Apple Mac OS X Mountain Lion 10.8 to v10.8.5 and is prone to security bypass vulnerability. The flaw is present in Directory Services, which fails to handle a crafted application. Successful exploitation allows local users to bypass password-based authentication and modify ...

oval:org.secpod.oval:def:17027
The host is installed with Apple Mac OS X or Server 10.7.5, 10.8.5, 10.9 or 10.9.1 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate. Success ...

oval:org.secpod.oval:def:17026
The host is installed with Apple Mac OS X or Server 10.7.5, 10.8.5, 10.9 or 10.9.1 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate. Success ...

oval:org.secpod.oval:def:17029
The host is installed with Apple Mac OS X 10.8.0 through 10.8.5 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle a crafted Microsoft Office document. Successful exploitation allows attackers to execute arbitrary code or cause a denial o ...

oval:org.secpod.oval:def:17020
The host is installed with Apple Mac OS X 10.9 or 10.9.1 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to ensure ACL integrity after the viewing of file ACL information. Successful exploitation allows attackers to bypass intended access restrictions ...

oval:org.secpod.oval:def:2028
The host is installed with Apple QuickTime before 7.7, Apple Mac OS X 10.6 through 10.6.6 or 10.7.0 before 10.7.2 and is prone to cross-origin bypass vulnerability. A flaw is present in the application which fails to properly handle cross-site redirects. Successful exploitation allows remote attacke ...

oval:org.secpod.oval:def:17024
The host is installed with Apple Mac OS X or Server 10.7.5, 10.8.5, 10.9 or 10.9.1 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to restrict the writes to some trusted memory on the graphics card. Successful exploitation allows attackers to ex ...

oval:org.secpod.oval:def:17023
The host is installed with Apple Mac OS X or Server 10.7.5, 10.8.5, 10.9 or 10.9.1 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to restrict the writes to some trusted memory on the graphics card. Successful exploitation allows attackers to ex ...

oval:org.secpod.oval:def:17022
The host is installed with Apple Mac OS X or Server 10.7.5, 10.8.5, 10.9 or 10.9.1 and is prone to spoofing vulnerability. A flaw is present in the application, which fails to handle properly restrict Unicode characters in filenames. Successful exploitation allows attackers to spoof file extensions ...

oval:org.secpod.oval:def:17021
The host is installed with Apple Mac OS X or Server 10.7.5 or 10.8.5 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle crafted application. Successful exploitation allows attackers to execute arbitrary commands.

oval:org.secpod.oval:def:17036
The host is installed with Apple Mac OS X or Server 10.7.5, 10.8.5, 10.9 or 10.9.1 and is prone to integer signedness error vulnerability. A flaw is present in the application, which fails to handle a crafted stsz atom in a movie file. Successful exploitation allows attackers to execute arbitrary co ...

oval:org.secpod.oval:def:17031
The host is installed with Apple Mac OS X or Server 10.7.5, 10.8.5, 10.9 or 10.9.1 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted ftab atom in a movie file. Successful exploitation allows attackers to execute arbitrary code or cau ...

oval:org.secpod.oval:def:17030
The host is installed with Apple Mac OS X 10.8.5, 10.9 or 10.9.1 and is prone to double free vulnerability. A flaw is present in the application, which fails to handle a crafted Microsoft Word file. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service.

oval:org.secpod.oval:def:17035
The host is installed with Apple Mac OS X or Server 10.7.5, 10.8.5, 10.9 or 10.9.1 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to properly perform a byte-swapping operation. Successful exploitation allows attackers to execute arbitrary code ...

oval:org.secpod.oval:def:17034
The host is installed with Apple Mac OS X or Server 10.7.5, 10.8.5, 10.9 or 10.9.1 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted PSD image. Successful exploitation allows attackers to execute arbitrary code or cause a denial of s ...

oval:org.secpod.oval:def:17033
The host is installed with Apple Mac OS X or Server 10.7.5, 10.8.5, 10.9 or 10.9.1 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted ldat atom in a movie file. Successful exploitation allows attackers to execute arbitrary code or cau ...

oval:org.secpod.oval:def:17032
The host is installed with Apple Mac OS X or Server 10.7.5, 10.8.5, 10.9 or 10.9.1 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted ftab atom in a movie file. Successful exploitation allows attackers to execute arbitrary code or cau ...

oval:org.secpod.oval:def:17006
The host is installed with Apple Mac OS X or Server 10.7.5, 10.8.5, 10.9 or 10.9.1 and is prone to remote code execution vulnerability. A flaw is present in the mod_rewrite module in the Apache HTTP Server, which fails to handle an HTTP request containing an escape sequence for a terminal emulator. ...

oval:org.secpod.oval:def:17009
The host is installed with Apple Mac OS X 10.8 through 10.8.5 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to handle a crafted app that uses the LaunchServices interface to specify process arguments. Successful exploitation allows attackers to bypa ...

oval:org.secpod.oval:def:17008
The host is installed with Apple Mac OS X or Server 10.7.5, 10.8.5, 10.9 or 10.9.1 and is prone to remote code execution vulnerability. A flaw is present in the mod_rewrite module in the Apache HTTP Server, which fails to handle an HTTP request containing an escape sequence for a terminal emulator. ...

oval:org.secpod.oval:def:17007
The host is installed with Apple Mac OS X 10.8.0 before 10.9.2 and is prone to remote code execution vulnerability. A flaw is present in the mod_dav.c in the Apache HTTP Server, which fails to handle a crafted Type 1 font that is embedded in a document. Successful exploitation allows attackers to ex ...

oval:org.secpod.oval:def:17017
The host is installed with Apple Mac OS X 10.9 before 10.9.2 and is prone to SSL spoofing vulnerability. A flaw is present in the application, which fails to check the signature in a TLS Server Key Exchange message. Successful exploitation allows attackers to spoof SSL servers by using an arbitrary ...

oval:org.secpod.oval:def:17016
The host is installed with Apple Mac OS X 10.9 before 10.9.2 and is prone to spoofing vulnerability. A flaw is present in the application, which fails to verify X.509 certificates from HTTPS servers that are accessed using a numerical IP address. Successful exploitation allows man-in-the-middle atta ...

oval:org.secpod.oval:def:17015
The host is installed with Apple Mac OS X 10.9 before 10.9.2 and is prone to integer signedness error vulnerability. A flaw is present in the application, which fails to handle crafted Unicode font. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service.

oval:org.secpod.oval:def:17014
The host is installed with Apple Mac OS X 10.8 before 10.9.2 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle crafted image. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service.

oval:org.secpod.oval:def:17019
The host is installed with Apple Mac OS X or Server 10.7.5, OSX 10.8.5, 10.9 or 10.9.1 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted filename. Successful exploitation allows attackers to execute arbitrary code or cause a denial o ...

oval:org.secpod.oval:def:17018
The host is installed with Apple Mac OS X or Server 10.7.5, 10.8.5, 10.9 or 10.9.1 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly handle user privileges. Successful exploitation allows attackers to bypass intended access restrictions by c ...

oval:org.secpod.oval:def:17013
The host is installed with Apple Mac OS X 10.8 through 10.8.5 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to remove session cookies upon a Safari reset action. Successful exploitation allows physically proximate attackers to bypass intended access ...

oval:org.secpod.oval:def:17012
The host is installed with Apple Mac OS X or Server 10.7.5, OSX 10.8.5, 10.9 or 10.9.1 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle crafted Mach messages. Successful exploitation allows attackers to bypass the App Sandbox protection mecha ...

oval:org.secpod.oval:def:17011
The host is installed with Apple Mac OS X 10.9 or 10.9.1 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly validate calls to the free function. Successful exploitation allows attackers to bypass the App Sandbox protection mechanism via craft ...

oval:org.secpod.oval:def:17010
The host is installed with Apple Mac OS X 10.9 before 10.9.2 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to handle crafted Mach messages. Successful exploitation allows attackers to bypass the App Sandbox protection mechanism.

oval:org.secpod.oval:def:21173
The host is installed with Xcode before 6.0.1 on Apple Mac OS X 10.9.4 or later and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle malicious data when SVNListParentPath was enabled. Successful exploitation could allow attackers to crash the ...

oval:org.secpod.oval:def:17516
The host is installed with Apple Mac OS X 10.9.2 and is prone to format string vulnerability. A flaw is present in the application, which fails to properly handle URLs. Successful exploitation allows attackers to cause arbitrary code execution.

oval:org.secpod.oval:def:17515
The host is installed with Apple Mac OS X or Server 10.7.5, OS X 10.8.5 or OS X 10.9.2 and is prone to privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle the processing of Set-Cookie HTTP headers. Successful exploitation allows attackers to obtai ...

oval:org.secpod.oval:def:17523
The host is installed with Apple Mac OS X 10.9.2 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle the screen lock/unlock. Successful exploitation allows the system to get unlocked.

oval:org.secpod.oval:def:17522
The host is installed with Apple Mac OS X 10.9.2 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly handle XNU object. Successful exploitation allows attackers to bypass kernel address space layout randomization.

oval:org.secpod.oval:def:17521
The host is installed with Apple Mac OS X 10.9.2 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly handle IOKit object. Successful exploitation allows attackers to bypass kernel address space layout randomization.

oval:org.secpod.oval:def:17520
The host is installed with Apple Mac OS X 10.8.5 or OS X 10.9.2 and is prone to improper validation vulnerability. A flaw is present in the application, which fails to properly handle a pointer from userspace. Successful exploitation allows attackers to take control of the system.

oval:org.secpod.oval:def:17527
The host is installed with Apple Mac OS X 10.8.5 or OS X 10.9.2 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle the WindowServer sessions. Successful exploitation allows attackers to execute arbitrary code outside the sandb ...

oval:org.secpod.oval:def:17526
The host is installed with Apple Mac OS X 10.8.5 or OS X 10.9.2 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly handle the sessions protected by SSL. Successful exploitation allows attackers to capture data or change the operations perform ...

oval:org.secpod.oval:def:17519
The host is installed with Apple Mac OS X 10.8.5 or OS X 10.9.2 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle JPEG images. Successful exploitation allows attackers to lead to an unexpected application termination or arbitrary code ...

oval:org.secpod.oval:def:17518
The host is installed with Apple Mac OS X 10.9.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle ASN.1 data. Successful exploitation allows attackers to cause a denial of service.

oval:org.secpod.oval:def:17517
The host is installed with Apple Mac OS X 10.8.5 and is prone to buffer underflow vulnerability. A flaw is present in the application, which fails to properly handle fonts in PDF files. Successful exploitation allows attackers to cause arbitrary code execution.

oval:org.secpod.oval:def:21259
The host is installed with Apple Mac OS X or Server 10.7.5, OS X 10.8.5 or OS X 10.9 through 10.9.4 and is prone to buffer overflow vulnerability. The flaws is present in the application, which fails to properly handle MIDI files. Successful exploitation may lead to an unexpected application termina ...

oval:org.secpod.oval:def:21257
The host is installed with Apple Mac OS X or Server 10.7.5, OS X 10.8.5 or OS X 10.9 through 10.9.4 and is prone to multiple vulnerabilities. The flaws are present in the application, which does not ensure that certain swap operations have a constant-time behavior. Successful exploitation may lead t ...

oval:org.secpod.oval:def:21258
The host is installed with Apple Mac OS X or Server 10.7.5, OS X 10.8.5 or OS X 10.9 through 10.9.4 and is prone to denial of service vulnerability. The flaw is present in the application, which fails to properly handle a crafted movie file with RLE encoding. Successful exploitation allows remote at ...

oval:org.secpod.oval:def:21260
The host is installed with Apple Mac OS X or Server 10.7.5, OS X 10.8.5 or OS X 10.9 through 10.9.4 and is prone to denial of service vulnerability. The flaw is present in the application, which fails to properly handle a malformed version number and flags in an mvhd atom. Successful exploitation ma ...

oval:org.secpod.oval:def:21248
The host is installed with Apple Mac OS X or Server 10.8.5 or OS X 10.9 through 10.9.4 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to bypass the ASLR protection mec ...

oval:org.secpod.oval:def:21249
The host is installed with Apple Mac OS X or Server 10.8.5 or OS X 10.9 through 10.9.4 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle an application that provides crafted values in unspecified metadata fields. Successful e ...

oval:org.secpod.oval:def:21246
The host is installed with Apple Mac OS X or Server 10.8.5 or OS X 10.9 through 10.9.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle an application that provides crafted API arguments. Successful exploitation allows attackers to ...

oval:org.secpod.oval:def:21247
The host is installed with Apple Mac OS X or Server 10.9 through 10.9.4 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to execute arbitrary code in a privileg ...

oval:org.secpod.oval:def:21255
The host is installed with Apple Mac OS X or Server 10.7.5, OS X 10.8.5 or OS X 10.9 through 10.9.4 and is prone to multiple vulnerabilities. The flaws are present in the application, which does not ensure that certain swap operations have a constant-time behavior. Successful exploitation may lead t ...

oval:org.secpod.oval:def:21256
The host is installed with Apple Mac OS X or Server 10.7.5, OS X 10.8.5 or OS X 10.9 through 10.9.4 and is prone to multiple vulnerabilities. The flaws are present in the application, which does not ensure that certain swap operations have a constant-time behavior. Successful exploitation may lead t ...

oval:org.secpod.oval:def:21254
The host is installed with Apple Mac OS X or Server 10.7.5, OS X 10.8.5 or OS X 10.9 through 10.9.4 and is prone to multiple vulnerabilities. The flaws are present in the application, which does not ensure that certain swap operations have a constant-time behavior. Successful exploitation may lead t ...

oval:org.secpod.oval:def:21251
The host is installed with Apple Mac OS X or Server 10.9 through 10.9.4 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly handle kernel addresses. Successful exploitation allows local users to obtain sensitive address information and bypass ...

oval:org.secpod.oval:def:21252
The host is installed with Apple Mac OS X or Server 10.8.5 or OS X 10.9 through 10.9.4 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:21250
The host is installed with Apple Mac OS X or Server 10.8.5 or OS X 10.9 through 10.9.4 or 10.10.x before 10.10.2 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle an application that provides crafted values in unspecified met ...

oval:org.secpod.oval:def:21239
The host is installed with Apple Mac OS X or Server 10.8.5 or OS X 10.9 through 10.9.4 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:21237
The host is installed with Apple Mac OS X or Server 10.8.5 or OS X 10.9 through 10.9.4 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:21238
The host is installed with Apple Mac OS X or Server 10.8.5 or OS X 10.9 through 10.9.4 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:21235
The host is installed with Apple Mac OS X or Server 10.9 through 10.9.4 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to properly handle XML data containing an external entity declaration . Successful exploitation allows attackers to read arb ...

oval:org.secpod.oval:def:21236
The host is installed with Apple Mac OS X or Server 10.8.5 or OS X 10.9 through 10.9.4 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted GLSL shader. Successful exploitation allows remote attackers to execute arbitrary code ...

oval:org.secpod.oval:def:21244
The host is installed with Apple Mac OS X or Server 10.8.5 or OS X 10.9 through 10.9.4 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:21245
The host is installed with Apple Mac OS X or Server 10.8.5 or OS X 10.9 through 10.9.4 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:21242
The host is installed with Apple Mac OS X or Server 10.8.5 or OS X 10.9 through 10.9.4 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:21243
The host is installed with Apple Mac OS X or Server 10.8.5 or OS X 10.9 through 10.9.4 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:21240
The host is installed with Apple Mac OS X or Server 10.8.5 or OS X 10.9 through 10.9.4 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:21241
The host is installed with Apple Mac OS X or Server 10.8.5 or OS X 10.9 through 10.9.4 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:21228
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9 through 10.9.5 or 10.10 before 10.10.3 and is prone to a denial of service vulnerability. The flaws are present in the application, which fails to properly handle a crafted CDF file. Successful exploitation allows attackers to crash th ...

oval:org.secpod.oval:def:21229
The host is installed with Apple Mac OS X or Server 10.9 through 10.9.4 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted ASCII file that triggers a large amount of backtracking. Successful exploitation allows attackers to ex ...

oval:org.secpod.oval:def:21226
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9 through 10.9.5 or 10.10 before 10.10.3 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted ASCII file that triggers a large amount of backtracking. Successful exp ...

oval:org.secpod.oval:def:21227
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9 through 10.9.5 or 10.10 before 10.10.3 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted ASCII file that triggers a large amount of backtracking. Successful exp ...

oval:org.secpod.oval:def:21224
The host is installed with Apple Mac OS X or Server 10.9 through 10.9.4 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted ASCII file that triggers a large amount of backtracking. Successful exploitation allows attackers to ex ...

oval:org.secpod.oval:def:21225
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9 through 10.9.5 or 10.10 before 10.10.3 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted ASCII file that triggers a large amount of backtracking. Successful exp ...

oval:org.secpod.oval:def:21233
The host is installed with Apple Mac OS X or Server 10.9 through 10.9.4 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted PDF document. Successful exploitation allows remote attackers to obtain sensitive information o ...

oval:org.secpod.oval:def:21234
The host is installed with Apple Mac OS X or Server 10.7.5, 10.8.5 or 10.9 through 10.9.4 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted PDF document. Successful exploitation allows remote attackers to obtain sensitive i ...

oval:org.secpod.oval:def:21232
The host is installed with Apple Mac OS X or Server 10.9 through 10.9.4 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which does not properly validate API calls. Successful exploitation allows attackers to execute arbitrary code in a privileged context ...

oval:org.secpod.oval:def:21230
The host is installed with Apple Mac OS X or Server 10.9 through 10.9.4 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted ASCII file that triggers a large amount of backtracking. Successful exploitation allows attackers to ex ...

oval:org.secpod.oval:def:21219
The host is installed with Apple Mac OS X or Server 10.9 through 10.9.4 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted ASCII file that triggers a large amount of backtracking. Successful exploitation allows attackers to ex ...

oval:org.secpod.oval:def:21218
The host is installed with Apple Mac OS X or Server 10.9 through 10.9.4 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted ASCII file that triggers a large amount of backtracking. Successful exploitation allows attackers to ex ...

oval:org.secpod.oval:def:21222
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9 through 10.9.5 or 10.10 before 10.10.3 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted ASCII file that triggers a large amount of backtracking. Successful exp ...

oval:org.secpod.oval:def:21223
The host is installed with Apple Mac OS X or Server 10.9 through 10.9.4 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted ASCII file that triggers a large amount of backtracking. Successful exploitation allows attackers to ex ...

oval:org.secpod.oval:def:21220
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9 through 10.9.5 or 10.10 before 10.10.3 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted ASCII file that triggers a large amount of backtracking. Successful exp ...

oval:org.secpod.oval:def:21221
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9 through 10.9.5 or 10.10 before 10.10.3 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted ASCII file that triggers a large amount of backtracking. Successful exp ...

oval:org.secpod.oval:def:21773
The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle the accessibility API. Successful exploitation allows attackers to bypass a sandbox protection mechanism.

oval:org.secpod.oval:def:25239
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted text file. Successful exploitation allows attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:25242
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted text file. Successful exploitation allows attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:25243
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted text file. Successful exploitation allows attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:25244
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted app. Successful exploitation allows attackers to obtain sensitive memo ...

oval:org.secpod.oval:def:25245
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not enforce a locking protection mechanism upon being woken from sleep. Successful exploitation allows attac ...

oval:org.secpod.oval:def:25246
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not properly set refresh rates for DDR3 RAM. Successful exploitation allows attackers to conduct row-hammer ...

oval:org.secpod.oval:def:25247
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to gain privileges.

oval:org.secpod.oval:def:25240
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted text file. Successful exploitation allows attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:25241
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted text file. Successful exploitation allows attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:25235
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted app. Successful exploitation allows attackers to obtain sensitive memo ...

oval:org.secpod.oval:def:25236
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted app. Successful exploitation allows attackers to execute arbitrary code in a ...

oval:org.secpod.oval:def:25237
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle crafted credentials in a URL. Successful exploitation allows attackers to execute arbi ...

oval:org.secpod.oval:def:25238
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted text file. Successful exploitation allows attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:21789
The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not ensure that a Kerberos ticket is in the cache for the correct user. Successful exploitation allows attackers to gain privileges in op ...

oval:org.secpod.oval:def:21787
The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a message to a system control socket. Successful exploitation allows attackers to cause a denial of service (panic).

oval:org.secpod.oval:def:21788
The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted ASN.1 data. Successful exploitation allows attackers to cause a denial of service (NULL pointer dereference).

oval:org.secpod.oval:def:21785
The host is installed with Apple Mac OS X or Server before 10.10 and is prone to an information disclosure vulnerability. A flaw is present in the application, which leverages access to an unintended proxy server. Successful exploitation allows attackers to obtain sensitive information in opportunis ...

oval:org.secpod.oval:def:21786
The host is installed with Apple Mac OS X or Server before 10.10 and is prone to an information disclosure vulnerability. A flaw is present in the application, which does not ensure that the disabling of File Sharing is always possible. Successful exploitation allows attackers to read or write to fi ...

oval:org.secpod.oval:def:21791
The host is installed with Apple Mac OS X or Server before 10.10 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted environment. Successful exploitation allows attackers to execute arbitrary code.

oval:org.secpod.oval:def:21778
The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted resource forks in an HFS filesystem. Successful exploitation allows attackers to execute arbitrary ...

oval:org.secpod.oval:def:21779
The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle crafted filename on an HFS filesystem. Successful exploitation allows attackers to cause a denial of service (NULL ...

oval:org.secpod.oval:def:21776
The host is installed with Apple Mac OS X or Server before 10.10 and is prone to an information disclosure vulnerability. A flaw is present in the application, which does not properly manage the screen-lock state. Successful exploitation allows attackers to view windows.

oval:org.secpod.oval:def:21777
The host is installed with Apple Mac OS X or Server before 10.10 and is prone to an information disclosure vulnerability. A flaw is present in the application, which does not properly display the encryption status in between a setting-update action and a reboot action. Successful exploitation allows ...

oval:org.secpod.oval:def:21774
The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not require encryption for HID Low Energy devices. Successful exploitation allows attackers to spoof a device.

oval:org.secpod.oval:def:21775
The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a remount. Successful exploitation allows attackers to obtain cleartext data.

oval:org.secpod.oval:def:21783
The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle an unattended workstation on which screen locking had been attempted. Successful exploitation allows attackers to obtain acces ...

oval:org.secpod.oval:def:21784
The host is installed with Apple Mac OS X or Server before 10.10 and is prone to an information disclosure vulnerability. A flaw is present in the application, which does not properly recognize the removal of a recipient address from a message. Successful exploitation allows attackers to obtain sens ...

oval:org.secpod.oval:def:21781
The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted application. Successful exploitation allows attackers to cause denial of service (out-of-bounds read operation).

oval:org.secpod.oval:def:21782
The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle an application that specifies a crafted handler for the Content-Type field of an object. Successful exploitation allows attack ...

oval:org.secpod.oval:def:21780
The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not properly enforce rate limiting of lost-mode PIN entry. Successful exploitation allows attackers to obtain access.

oval:org.secpod.oval:def:24065
The host is installed with Xcode before 6.2 on Apple Mac OS X 10.9.4 or later and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to handle a crafted certificate. Successful exploitation could allow man-in-the-middle attackers to spoof servers.

oval:org.secpod.oval:def:24066
The host is installed with Xcode before 6.2 on Apple Mac OS X 10.9.4 or later and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a crafted authentication realm. Successful exploitation could allow remote servers to obtain the credentials.

oval:org.secpod.oval:def:24067
The host is installed with Xcode before 6.2 on Apple Mac OS X 10.9.4 or later and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a REPORT request for a resource that does not exist. Successful exploitation could allow remote remote attacker ...

oval:org.secpod.oval:def:24068
The host is installed with Xcode before 6.2 on Apple Mac OS X 10.9.4 or later and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a request for a URI that triggers a lookup for a virtual transaction name that does not exist. Successful explo ...

oval:org.secpod.oval:def:24064
The host is missing a security update according to Apple advisory, APPLE-SA-2015-03-09-4. The update is required to fix multiple vulnerabilities. A flaw is present in the application, which fails to handle crafted vectors. Successful exploitation could allow attackers to spoof SSL servers or add une ...

oval:org.secpod.oval:def:24175
The host is missing a security update according to Apple advisory, APPLE-SA-2015-04-08-5. The update is required to fix an integer overflow vulnerability. A flaw is present in the application, which fails to properly perform check before type conversions. Successful exploitation could allow attacker ...

oval:org.secpod.oval:def:24174
The host is installed with Xcode before 6.3 on Apple Mac OS X 10.9.4 or later and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly perform check before type conversions. Successful exploitation could allow attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:23889
The host is installed with Apple Mac OS X 10.8.5, 10.9.5 or 10.10.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle serialized objects. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:23888
The host is installed with Apple Mac OS X 10.8.5, 10.9.5 or 10.10.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly perform bounds checking. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:23887
The host is installed with Apple Mac OS X 10.10.2 and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to properly perform bounds checking. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:23892
The host missing a security update according to Apple advisory, APPLE-SA-2015-03-09-3. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:23891
The host is installed with Apple Mac OS X 10.8.5, 10.9.5 or 10.10.2 and is prone to a man-in-the-middle attack vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to downgrade the TLS session security and pot ...

oval:org.secpod.oval:def:23890
The host is installed with Apple Mac OS X 10.10.2 and is prone to an ASLR bypass vulnerability. A flaw is present in the application, which fails to properly handle malicious or compromised applications. Successful exploitation could allow attackers to determine addresses in the kernel.

oval:org.secpod.oval:def:25253
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to gain privileges.

oval:org.secpod.oval:def:26585
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a NewSessionTicket during an attempt to reuse a ticket that had been obtained earlier. Successf ...

oval:org.secpod.oval:def:25254
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to gain privileges.

oval:org.secpod.oval:def:26584
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data. Successful exploi ...

oval:org.secpod.oval:def:25256
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in libtiff, which fails to handle unspecified vectors. Successful exploitation allows attackers to arbitrary code execution.

oval:org.secpod.oval:def:26586
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle vectors that trigger a NULL value of a BIO data structure. Successful exploitation allows attac ...

oval:org.secpod.oval:def:25257
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in libtiff, which fails to handle unspecified vectors. Successful exploitation allows attackers to arbitrary code execution.

oval:org.secpod.oval:def:26589
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a specially crafted timestamp formatting template. Successful exploitation allows attackers to ca ...

oval:org.secpod.oval:def:25258
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in libtiff, which fails to handle unspecified vectors. Successful exploitation allows attackers to arbitrary code execution.

oval:org.secpod.oval:def:26588
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle certain error messages. Successful exploitation allows attackers to obtain the results of a ...

oval:org.secpod.oval:def:25259
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted TIFF image. Successful exploitation allows attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:26581
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4, 10.11.x before 10.11.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted XML document. Successful exploitation allows a ...

oval:org.secpod.oval:def:25250
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to gain privileges.

oval:org.secpod.oval:def:26580
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle unknown vector. Successful exploitation allows attackers to cause a denial of service.

oval:org.secpod.oval:def:25251
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to gain privileges.

oval:org.secpod.oval:def:26583
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted length field in ASN1_TIME data. Successful exploitation allows attackers to cause a d ...

oval:org.secpod.oval:def:25252
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to gain privileges.

oval:org.secpod.oval:def:26582
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field ...

oval:org.secpod.oval:def:26574
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font file. Successful exploitation allows attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:26576
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font file. Successful exploitation allows attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:26575
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font file. Successful exploitation allows attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:26578
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle an AF_INET6 socket. Successful exploitation allows attackers to execute arbitrary code ...

oval:org.secpod.oval:def:26577
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font file. Successful exploitation allows attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:25248
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to gain privileges.

oval:org.secpod.oval:def:25249
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to gain privileges.

oval:org.secpod.oval:def:26579
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle unknown vector. Successful exploitation allows attackers to cause a denial of service.

oval:org.secpod.oval:def:25297
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to a symlink attack vulnerability. A flaw is present in the application, which fails to handle a crafted app that conducts a symlink attack. Successful exploitation allows remote attackers to write to arbitrary ...

oval:org.secpod.oval:def:25298
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a crafted app that conducts a symlink attack. Successful exploitation allows remote attackers to bypass intended si ...

oval:org.secpod.oval:def:25299
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a crafted HTML e-mail message. Successful exploitation allows remote attackers to trigger a refresh operation, and ...

oval:org.secpod.oval:def:25290
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted font file. Successful exploitation allows remote attackers to execute arbitrary code or cause a ...

oval:org.secpod.oval:def:25291
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation allows remote attackers to execute arbitrary code in a privileged ...

oval:org.secpod.oval:def:25292
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation allows remote attackers to execute arbitrary code in a privileged ...

oval:org.secpod.oval:def:25293
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation allows remote attackers to execute arbitrary code in a privileged ...

oval:org.secpod.oval:def:25294
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation allows remote attackers to execute arbitrary code in a privileged ...

oval:org.secpod.oval:def:25295
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation allows remote attackers to obtain sensitive memory-layout informatio ...

oval:org.secpod.oval:def:25296
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which does not properly handle HFS parameters. Successful exploitation allows remote attackers to obtain sensitive memory-layout ...

oval:org.secpod.oval:def:25286
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted font file. Successful exploitation allows attackers to execute arbitrary code or cause a denial of serv ...

oval:org.secpod.oval:def:25287
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted font file. Successful exploitation allows attackers to execute arbitrary code or cause a denial of serv ...

oval:org.secpod.oval:def:25289
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted app that leverages control of a function pointer. Successful exploitation allows remote attacke ...

oval:org.secpod.oval:def:25280
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to execute arbitrary code or cause a denial of ...

oval:org.secpod.oval:def:25281
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a crafted URL. Successful exploitation allows attackers to bypass HTTP authentication.

oval:org.secpod.oval:def:25282
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation allows attackers to obtain sensitive memory-layout information.

oval:org.secpod.oval:def:25283
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified Thunderbolt commands. Successful exploitation allows attackers to gain privileges or cause a denial o ...

oval:org.secpod.oval:def:25284
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted font file. Successful exploitation allows attackers to execute arbitrary code or cause a denial of serv ...

oval:org.secpod.oval:def:25285
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted font file. Successful exploitation allows attackers to execute arbitrary code or cause a denial of serv ...

oval:org.secpod.oval:def:25275
The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not properly verify XPC entitlements. Successful exploitation allows attackers to bypass authentication and obtain a ...

oval:org.secpod.oval:def:25276
The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not properly handle authentication errors. Successful exploitation allows attackers to bypass authentication and obt ...

oval:org.secpod.oval:def:25279
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not properly restrict the location of writeconfig clients. Successful exploitation allows attackers to obtain root privileges ...

oval:org.secpod.oval:def:25270
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code or c ...

oval:org.secpod.oval:def:25271
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle a large size value. Successful exploitation allows attackers to cause a denial of service or po ...

oval:org.secpod.oval:def:25272
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not properly consider custom resource rules during app signature verification. Successful exploitation allow ...

oval:org.secpod.oval:def:25273
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not properly consider libraries that are external to an application bundle. Successful exploitation allows a ...

oval:org.secpod.oval:def:25274
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an arbitrary commands execution vulnerability. A flaw is present in the application, which fails to handle a crafted name of a photo file within the local photo library. Successful exploitat ...

oval:org.secpod.oval:def:25264
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code or c ...

oval:org.secpod.oval:def:25265
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code or c ...

oval:org.secpod.oval:def:25266
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code or c ...

oval:org.secpod.oval:def:25267
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code or c ...

oval:org.secpod.oval:def:25268
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code or c ...

oval:org.secpod.oval:def:25269
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code or c ...

oval:org.secpod.oval:def:26590
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a specially crafted string. Successful exploitation allows attackers to crash or potentially, lea ...

oval:org.secpod.oval:def:25260
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation allows attackers to execute arbitrary code in a ...

oval:org.secpod.oval:def:26592
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a sql injection vulnerability. A flaw is present in the application, which fails to handle certain errors that were generated during protocol synchronization. Successful exploitation allows ...

oval:org.secpod.oval:def:25261
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation allows attackers to obtain sensitive memory-layout ...

oval:org.secpod.oval:def:26591
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a stack-buffer overflow vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to cause PostgreSQL to crash or, ...

oval:org.secpod.oval:def:26594
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted QuickTime file. Successful exploitation allows attackers to execute arbitrary code or ...

oval:org.secpod.oval:def:26593
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a maliciously crafted Office document. Successful exploitation allows attackers to execute arbi ...

oval:org.secpod.oval:def:25306
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial ...

oval:org.secpod.oval:def:25307
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted app, related to a "type confusion" issue. Successful exploitation allows remote attackers to ex ...

oval:org.secpod.oval:def:25308
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted font file. Successful exploitation allows remote attackers to execute arbitrary code or cause a ...

oval:org.secpod.oval:def:25309
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted font file. Successful exploitation may lead to an unexpected application termination or arbitra ...

oval:org.secpod.oval:def:25310
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted font file. Successful exploitation may lead to an unexpected application termination or arbitra ...

oval:org.secpod.oval:def:25311
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted font file. Successful exploitation may lead to an unexpected application termination or arbitra ...

oval:org.secpod.oval:def:25302
The host is installed with Apple Mac OS X or Server 10.8, 10.9 or before 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which does not reinitialize CHOICE and ADB data structures. Successful exploitation allow remote attackers to cause a denial of se ...

oval:org.secpod.oval:def:25303
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle an invalid certificate key. Successful exploitation allows remote attackers to cause a denial of service (NULL po ...

oval:org.secpod.oval:def:25304
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which does not properly handle a lack of outer ContentInfo. Successful exploitation allows remote attackers to cause a denial of servic ...

oval:org.secpod.oval:def:2589
The host is installed with Apple Mac OS X 10.6.x before 10.6.5 or iWork 9.0 through 9.0.5 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to prevent memory corruption. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:2588
The host is installed with Apple Mac OS X 10.5.8 and 10.6.x before 10.6.5 or iWorks 9.0 through 9.0.5 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted office document. Successful exploitation could allow attackers to crash the se ...

oval:org.secpod.oval:def:2592
The host is missing a security update according to APPLE-SA-2011-01-06-1. The update is required to fix multiple vulnerabilities. The flaws are present in PackageKit, which fail to handle distribution scripts. Successful exploitation could allow an attacker to execute arbitrary code or crash the ser ...

oval:org.secpod.oval:def:2593
The host is installed with Apple Mac OS X 10.6 through 10.6.5 and is prone to a format string vulnerability. A flaw is present in the application, which fails to prevent man in the middle attack. Successful exploitation could allow an attacker to execute arbitrary code or crash the service.

oval:org.secpod.oval:def:2590
The host is installed with Apple Mac OS X before 10.6.7 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle a Microsoft Office document with a crafted size field. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:26596
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code or cause a d ...

oval:org.secpod.oval:def:26595
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code or cause a d ...

oval:org.secpod.oval:def:26598
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code or cause a d ...

oval:org.secpod.oval:def:26597
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code or cause a d ...

oval:org.secpod.oval:def:26599
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code or cause a d ...

oval:org.secpod.oval:def:26617
The host is installed with Apple Mac OS X or Server 10.8, 10.9 or before 10.10.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle pipelined HTTP requests. Successful exploitation allow attackers to cause a denial of service (application c ...

oval:org.secpod.oval:def:26604
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code or cause a d ...

oval:org.secpod.oval:def:26603
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code or cause a d ...

oval:org.secpod.oval:def:26606
The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle an empty HTTP Content-Type header. Successful exploitation allows attackers to cause a denial of servic ...

oval:org.secpod.oval:def:26605
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code or caus ...

oval:org.secpod.oval:def:26608
The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which does not support an httpd configuration. Successful exploitation allows attackers to bypass intended access restr ...

oval:org.secpod.oval:def:26607
The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle long response headers. Successful exploitation allows attackers to cause a denial of service (buffer ov ...

oval:org.secpod.oval:def:2722
The is host missing a security update according to APPLE-SA-2011-04-14-4. The update is required to fix an information disclosure vulnerability. A flaw is present in the application, which fails to identify fraudulent SSL certificates. Successful exploitation could allow attackers to gain user crede ...

oval:org.secpod.oval:def:26600
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code or cause a d ...

oval:org.secpod.oval:def:26602
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code or cause a d ...

oval:org.secpod.oval:def:26601
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code or cause a d ...

oval:org.secpod.oval:def:26659
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows local users to gain privileges or cause a denial of service ( ...

oval:org.secpod.oval:def:26658
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an arbitrary code execute vulnerability. A flaw is present in the application, which fails to handle a crafted app that leverages incorrect privilege dropping associated with a locking error. Successful explo ...

oval:org.secpod.oval:def:26662
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service (m ...

oval:org.secpod.oval:def:26661
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows local users to gain privileges or cause a d ...

oval:org.secpod.oval:def:26664
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to local users to gain privileges.

oval:org.secpod.oval:def:26663
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service (m ...

oval:org.secpod.oval:def:26666
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted app that makes unspecified IOKit API calls. Successful exploitation allows attackers to execute arbitra ...

oval:org.secpod.oval:def:26665
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation allows attackers to obtain sensitive memory-layout information.

oval:org.secpod.oval:def:26668
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted volume. Successful exploitation allows local users to cause a denial of service.

oval:org.secpod.oval:def:26667
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows local users to cause a denial of service (resource consumptio ...

oval:org.secpod.oval:def:26660
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows local users to gain privileges or cause a denial of service ( ...

oval:org.secpod.oval:def:26648
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a time spoofing vulnerability. A flaw is present in the application, which does not properly restrict access to the Date and Time preferences pane. Successful exploitation allows local users to spoof the time ...

oval:org.secpod.oval:def:26647
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted series of Unicode characters. Successful exploitation allows remote proxy servers to execute arbitrary ...

oval:org.secpod.oval:def:26649
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which does not use HTTPS. Successful exploitation allows man-in-the-middle attackers to obtain sensitive information by sniffing ...

oval:org.secpod.oval:def:26651
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which does not properly validate pathnames in the environment. Successful exploitation allows local users to gain privileges.

oval:org.secpod.oval:def:26650
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed DMG image. Successful exploitation allows local users to gain privileges or cause a denial of service ...

oval:org.secpod.oval:def:26653
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an arbitrary files overwrite vulnerability. A flaw is present in the application, which fails to handle a crafted document. Successful exploitation allows remote attackers to create, overwrite, rename, or del ...

oval:org.secpod.oval:def:26652
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an arbitrary files overwrite vulnerability. A flaw is present in the application, which fails to handle a symlink attack on a pdf#####.tmp temporary file. Successful exploitation allows local users to overwri ...

oval:org.secpod.oval:def:26655
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which does not properly initialize an unspecified data structure. Successful exploitation allows remote attackers to obtain sensi ...

oval:org.secpod.oval:def:26654
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted TIFF image. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial ...

oval:org.secpod.oval:def:26657
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an arbitrary code execute vulnerability. A flaw is present in the application, which does not properly drop privileges. Successful exploitation allows remote attackers to execute arbitrary code in a privilege ...

oval:org.secpod.oval:def:26656
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which does not properly initialize an unspecified data structure. Successful exploitation allows remote attackers to obtain sensi ...

oval:org.secpod.oval:def:26636
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted font file. Successful exploitation allows attackers to execute arbitrary code or cause a denial of serv ...

oval:org.secpod.oval:def:26638
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to bypass the Same Origin Policy and set cookies for arbi ...

oval:org.secpod.oval:def:26641
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a server spoofing vulnerability. A flaw is present in the application, which does not check if a cached TLS session validated the certificate when reusing the session. Successful exploitation allows man-in-th ...

oval:org.secpod.oval:def:26644
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which does not properly calculate an index. Successful exploitation allows remote attackers to cause a denial of service (out-of-bounds ...

oval:org.secpod.oval:def:26643
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which does not properly calculate an index. Successful exploitation allows remote attackers to cause a denial of service (out-of-bounds ...

oval:org.secpod.oval:def:26646
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which sends custom HTTP headers to both the proxy and destination server. Successful exploitation allows remote proxy servers to ...

oval:org.secpod.oval:def:26626
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an arbitrary user password change vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to change arbitrary user passwords.

oval:org.secpod.oval:def:26625
The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which does not properly prevent entity expansion even when entity substitution has been disabled. Successful exploitation all ...

oval:org.secpod.oval:def:26628
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a kernel memory-layout information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation allows attackers to obtain sensitive kernel memo ...

oval:org.secpod.oval:def:26627
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a kernel memory-layout information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation allows attackers to obtain sensitive kernel memo ...

oval:org.secpod.oval:def:26629
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which does not properly restrict Notification Center Service access. Successful exploitation allows attackers to read Notificatio ...

oval:org.secpod.oval:def:26631
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to multiple buffer overflows vulnerabilities. The flaws are present in the application, which fails to handle XPC messages. Successful exploitation allows attackers to gain privileges.

oval:org.secpod.oval:def:26630
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle malformed Bluetooth ACL packets. Successful exploitation allows attackers to cause a denial of service.

oval:org.secpod.oval:def:26633
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation allows attackers to access an iCloud user record associated with a p ...

oval:org.secpod.oval:def:26632
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to obtain potentially sensitive information about ...

oval:org.secpod.oval:def:26635
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted movie file. Successful exploitation allows attackers to execute arbitrary code or cause a denial of ser ...

oval:org.secpod.oval:def:26634
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted movie file. Successful exploitation allows attackers to execute arbitrary code or cause a denial of ser ...

oval:org.secpod.oval:def:26695
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted Unicode string. Successful exploitation allows remote attackers to execute arbitrary code or cause a de ...

oval:org.secpod.oval:def:26694
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial ...

oval:org.secpod.oval:def:26697
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle vectors related to connecting to the standard input, output and error file descriptors of another terminal. Success ...

oval:org.secpod.oval:def:26696
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a system clock and sudo user timestamp with epoch. Successful exploitation allows local users or physically proxima ...

oval:org.secpod.oval:def:26699
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle vectors related to connecting to the standard input, output and error file descriptors of another terminal. Success ...

oval:org.secpod.oval:def:26698
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle vectors related to connecting to the standard input, output and error file descriptors of another terminal. Success ...

oval:org.secpod.oval:def:26691
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to handle a previously visited web site that is rendered during a Quick Look search. Successful exploitation allow ...

oval:org.secpod.oval:def:26690
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an arbitrary file read vulnerability. A flaw is present in the application, which fails to handle an XML document containing an external entity declaration in conjunction with an entity reference. Successful ...

oval:org.secpod.oval:def:26693
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which does not properly implement authentication. Successful exploitation allows local users to obtain admin privileges.

oval:org.secpod.oval:def:26692
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted Collada file. Successful exploitation allows remote attackers to execute arbitrary code.

oval:org.secpod.oval:def:26684
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an integer underflow vulnerability. A flaw is present in the application, which fails to handle a long digit string associated with an invalid backreference within a regular expression. Successful exploitatio ...

oval:org.secpod.oval:def:26683
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a long and duplicative list in the ssh -oKbdInteractiveDevices option. Successful exploitation allows remote atta ...

oval:org.secpod.oval:def:26686
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a file size value larger than the size of the zip file to the (1) ZipExtFile.read, (2) ZipExtFile.read(n), (3) Zi ...

oval:org.secpod.oval:def:26685
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted input to an application that maintains a hash table. Successful exploitation allows context-dependent a ...

oval:org.secpod.oval:def:26680
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an arbitrary shell command execution vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to execute arbitrary shell commands.

oval:org.secpod.oval:def:26682
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows local users to gain privileges or cause a denial of service ( ...

oval:org.secpod.oval:def:26681
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which does not properly remove dismissed notifications. Successful exploitation allows attackers to read arbitrary notifications.

oval:org.secpod.oval:def:26669
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a crafted executable file. Successful exploitation allows local users to bypass a code-signing protection mechanism ...

oval:org.secpod.oval:def:26673
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a malformed plist. Successful exploitation allows attackers to execute arbitrary code in a privileged context or ...

oval:org.secpod.oval:def:26672
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a crafted Mach-O file. Successful exploitation allows local users to bypass a code-signing protection mechanism.

oval:org.secpod.oval:def:26675
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted regular expression. Successful exploitation allows context-dependent attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:26674
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which does not properly validate pathnames in the environment. Successful exploitation allows local users to gain privileges.

oval:org.secpod.oval:def:26677
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted regular expression. Successful exploitation allows context-dependent attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:26676
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted regular expression. Successful exploitation allows context-dependent attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:26679
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted app that sends a malformed XPC message. Successful exploitation allows attackers to execute arbitrary c ...

oval:org.secpod.oval:def:26678
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle an app that uses a crafted syscall to interfere with locking. Successful exploitation allows attackers to execute ...

oval:org.secpod.oval:def:26671
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a crafted Mach-O file. Successful exploitation allows local users to bypass a code-signing protection mechanism.

oval:org.secpod.oval:def:26670
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a crafted multi-architecture executable file. Successful exploitation allows local users to bypass a code-signing p ...

oval:org.secpod.oval:def:2862
The host is installed with Apple Mac OS X 10.5.8 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, as it fails to handle Window's Security ID's. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

oval:org.secpod.oval:def:2861
The host is installed with Apple Mac OS X 10.6 through 10.6.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle Microsoft office files. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

oval:org.secpod.oval:def:2863
The host is installed with Apple Mac OS X 10.5.8 or 10.6 through 10.6.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle file descriptor's. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:2865
The host is installed with Apple Mac OS X 10.5.8 or 10.6 through 10.6.7 and is prone to a denial of service vulnerability. A flaw is present in the application, as it fails to handle lock tokens sent over http. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:2846
The host is installed with Apple Mac OS X 10.5.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle the Wi-Fi frames. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:2848
The host is installed with Apple Mac OS X 10.6 through 10.6.7 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the application, as it fails to handle the TrueType fonts. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:2847
The host is installed with Apple Mac OS X before 10.6.8 and is prone to an information disclosure vulnerability. A flaw is present in the application, which creates a log entry containing user's AppleID password. Successful exploitation may allow remote attackers to obtain sensitive information.

oval:org.secpod.oval:def:26703
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted Ad hoc On-Demand Distance Vector (AODV) packet. Successful exploitation allows remote attackers t ...

oval:org.secpod.oval:def:26702
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an integer underflow vulnerability. A flaw is present in the application, which fails to handle a crafted length value in an OLSR frame. Successful exploitation allows remote attackers to cause a denial of se ...

oval:org.secpod.oval:def:2852
The host is installed with Apple Mac OS X 10.5.8 or 10.6.0 through 10.6.7 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle Type 1 fonts. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:26705
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an arbitrary file read vulnerability. A flaw is present in the application, which fails to handle a text file containing an XML external entity declaration in conjunction with an entity reference. Successful ...

oval:org.secpod.oval:def:2855
The host is installed with Apple Mac OS X 10.5.8 or 10.6 through 10.6.7 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle JPEG2000 images. Successful exploitation could allow attackers to execute arbitrary code or crash the servic ...

oval:org.secpod.oval:def:26704
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted PPP packet. Successful exploitation allows remote attackers to cause a denial of service (crash).

oval:org.secpod.oval:def:2857
The host is installed with Apple Mac OS X 10.6 through v10.6.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle the IPV6 sockets. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:26706
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a malformed DMG image. Successful exploitation allows local users to gain privileges or cause a denial of service ...

oval:org.secpod.oval:def:2859
The host is installed with Apple Mac OS X 10.6 through 10.6.7 and is prone to an information disclosure vulnerability. A flaw is present in the application, which uses cleartext HTTP session to read e-mail addresses. Successful exploitation could allow a privileged attacker to retrieve an user's ema ...

oval:org.secpod.oval:def:2858
The host is installed with Apple Mac OS X 10.5.8 or 10.6 through 10.6.7 and is prone to an information disclosure vulnerability. A flaw is present in the application, which discloses the addresses of heap buffer. Successful exploitation could allow attackers to disclose sensitive information.

oval:org.secpod.oval:def:2849
The host is installed with Apple Mac OS X 10.6 through 10.6.7 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to check the CRL properly and a revoked certificate may be accepted as valid. Successful exploitation could allow attackers to spo ...

oval:org.secpod.oval:def:2875
The host is installed with Apple Mac OS X 10.6 through 10.6.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed record in a TLS connection. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:2874
The host is installed with Apple Mac OS X 10.6 through 10.6.7 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle a NULL return value. Successful exploitation may have unspecified impact.

oval:org.secpod.oval:def:2877
The host is installed with Apple Mac OS X 10.6 through 10.6.7 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to prevent modification of the ciphersuite in the session cache. Successful exploitation could allow attackers to discover a sessio ...

oval:org.secpod.oval:def:2876
The host is installed with Apple Mac OS X 10.6 through 10.6.7 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, that fails to handle client data that triggers a buffer overflow. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:2879
The host is installed with Apple Mac OS X 10.5.8 or 10.6 through 10.6.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a glob pattern from an untrusted application. Successful exploitation may allow attackers to crash the service.

oval:org.secpod.oval:def:2878
The host is installed with Apple Mac OS X 10.6 through 10.6.7 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle an out-of-bounds memory access. Successful exploitation could allow attackers to obtain sensitive information.

oval:org.secpod.oval:def:2881
The host is missing an update according to Apple advisory APPLE-SA-2011-05-31-1. The update is required to fix a security bypass vulnerability. A flaw is present in the application, which fails to detect malware. Successful exploitation allows attackers to launch a malware and retrieve sensitive inf ...

oval:org.secpod.oval:def:3034
The host is installed with PHP 5.2.x through 5.2.14 and 5.3.x through 5.3.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted ZIP archive. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3031
The host is installed with GNU Mailman before 2.1.14rc1 and is prone to multiple cross site scripting vulnerabilities. A flaw is present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to inject arbitrary script.

oval:org.secpod.oval:def:3032
The host is installed with PHP 5.3.4 and is prone to a null byte injection vulnerability. A flaw is present in the application, which accepts the \0 character in a pathname. Successful exploitation could allow attackers to bypass intended access restrictions.

oval:org.secpod.oval:def:3037
The host is installed with PHP 5.2 before 5.2.15 and 5.3 before 5.3.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:3035
The host is installed with PHP 5.2.x through 5.2.14 and 5.3.x through 5.3.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a long email address string. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3036
The host is installed with PHP before 5.3.4 and is prone to multiple vulnerabilities. The flaws are present the application, which fails to properly handle non-shortest form UTF-8 encoding and ill-formed subsequences in UTF-8 data. Successful exploitation could allow attackers to bypass cross-site s ...

oval:org.secpod.oval:def:3039
The host is installed with PHP 5.3.x through 5.3.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a crafted filename length. Successful exploitation could allow attackers to bypass security.

oval:org.secpod.oval:def:3030
The host is installed with Apple Mac OS X 10.5.8 or 10.6 through 10.6.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an unspecified integer field in an NFS RPC packet. Successful exploitation could allow attackers to crash th ...

oval:org.secpod.oval:def:3045
The host is installed with Ruby 1.9.2-p136 and earlier and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3046
The host is installed with Apache HTTP Server as distributed in Apache Subversion 1.5.x before 1.5.8 and 1.6.x before 1.6.13 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a named repository as a rule scope. Successful exploitation could ...

oval:org.secpod.oval:def:3047
The host is installed with Apple Mac OS X 10.6 through 10.6.6 and is prone to man-in-the-middle attack. A flaw is present in the application, which fails to prevent leveraging protocol vulnerabilities. Successful exploitation could allow attackers to spoof SSH servers.

oval:org.secpod.oval:def:3040
The host is installed Quicklook in Apple Mac OS X 10.6 through 10.6.6 and is prone to a denial of service vulnerability. A flaw is present in the application, that fials to handle an Excel spreadsheet with a crafted formula that uses unspecified opcodes. Successful exploitation could allow attackers ...

oval:org.secpod.oval:def:3041
The host is installed with QuickTime in Apple Mac OS X 10.6 through 10.6.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted JPEG2000 image. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3011
The host is installed with Apple Mac OS X 10.6 through 10.6.6 and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to handle a document that contains a crafted embedded Type 1 font. Successful exploitation could allow attackers to execute ar ...

oval:org.secpod.oval:def:3012
The host is installed with Apple Mac OS X 10.6 through 10.6.6 and is prone to multiple buffer overflow vulnerabilities. A flaw is present in the application, which fails to handle a document that contains a crafted SFNT table in an embedded font. Successful exploitation could allow attackers to exec ...

oval:org.secpod.oval:def:3010
The host is installed with Apple Mac OS X and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to handle a document that contains a crafted embedded TrueType font. Successful exploitation could allow attackers to cause multiple buffer overfl ...

oval:org.secpod.oval:def:3013
The host is installed with bzip2 and libbzip2 before 1.0.6 and is pone to an integer overflow vulnerability. A flaw is present in the applications, which fails to handle a crafted compressed file. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3014
The host is installed with Apple Mac OS X 10.6 through 10.6.6 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a call with the kTemporaryFolderType flag. Successful exploitation could allow attackers to disclose sensitive informatio ...

oval:org.secpod.oval:def:3019
The host is installed with Apple Mac OS X 10.6 through 10.6.6 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle a document that contains a crafted embedded font. Successful exploitation could allow attackers to execute arbitrary code o ...

oval:org.secpod.oval:def:3022
The host is installed with Apple Mac OS X 10.6 through 10.6.6 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted TIFF image with JPEG encoding.

oval:org.secpod.oval:def:3023
The host is installed with Apple Mac OS X 10.6 through 10.6.6 and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the applications, which fails to handle a crafted Canon RAW image. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3020
The host is installed with Apple Mac OS X 10.6 through 10.6.6 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to read arbitrary (1) HFS, (2) HFS+, or (3) HFS+J files. Successful exploitation could allow attackers to read arbitrary data.

oval:org.secpod.oval:def:3021
The host is installed with Apple Mac OS X 10.5.8 or 10.6 through 10.6.6 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted XBM image. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

oval:org.secpod.oval:def:3026
The host is installed with MIT Kerberos 5 1.7.x and is prone to multiple remote security bypass vulnerabilities. Multiple flaws are present in the application, which fails to properly handle unkeyed checksums. Successful exploitation could allow remote attackers to forge GSS tokens, gain privileges, ...

oval:org.secpod.oval:def:3027
The host is installed with MIT Kerberos 5 (aka krb5) 1.8.x through 1.8.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to reject RC4 key-derivation checksums. Successful exploitation could allow attackers to bypass security.

oval:org.secpod.oval:def:3024
The host is installed with Apple Mac OS X 10.6 through 10.6.6 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a URL processing issue in Install Helper. Successful exploitation could allow attackers to track user logins.

oval:org.secpod.oval:def:3025
The host is installed with Apple Mac OS X 10.5.8 or 10.6 through 10.6.6 and is prone to multiple cryptographic issues. The flaws are present in the application, which do not properly determine the acceptability of checksums. Successful exploitation could allow attackers to bypass security.

oval:org.secpod.oval:def:3028
The host is installed with MIT Kerberos 5 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle 'KrbFastReq' forgery issue. Successful exploitation could allow attackers to bypass security.

oval:org.secpod.oval:def:3029
The host is installed with Apple Mac OS X 10.6 through 10.6.6 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which does not properly handle call gates. Successful exploitation could allow attackers to gain privileges.

oval:org.secpod.oval:def:3005
The host is installed with Mac OS X 10.6 through 10.6.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a divide by zero error. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3008
The host is installed with Mac OS X 10.6 through 10.6.6 and is prone to multiple format string vulnerabilities. A flaw is present in the application, which fails to handle format string specifiers. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3009
The host is installed with Apple Mac OS X 10.6.0 through 10.6.6 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application which fails to handle open type fonts. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:3006
The host is installed with Apache HTTP Server 2.2.x before 2.2.16 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a request that lacks path. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3154
The host is installed with Apple Mac OS X 10.6.8 and is prone to multiple vulnerabilities. The flaw are present in the application, which fails to handle disk images. Successful exploitation could allow attackers to crash the service or execute arbitrary code.

oval:org.secpod.oval:def:3155
The host is installed with Apple Mac OS X 10.6.8 and is prone to multiple cross-site scripting (XSS) vulnerabilities. The flaw are present in the application, which fails to properly encode characters in html output. Successful exploitation could allow attackers to inject arbitrary code.

oval:org.secpod.oval:def:3152
The host is installed with Apple Mac OS X 10.7 before 10.7.2 and is prone to a authentication bypass vulnerability. A flaw is present in the application, which fails to properly handle authentication authority. Successful exploitation could allow attackers to bypass the password requirement.

oval:org.secpod.oval:def:3153
The host is installed with Apple Mac OS X 10.7 before 10.7.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle access control issue existed in Open Directory. Successful exploitation could allow attackers to another local user's pass ...

oval:org.secpod.oval:def:3156
The host is installed with Apple Mac OS X 10.7.0 before 10.7.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to handle errors during processing of a nonstandard extension in a Certificate Revocation list (CRL). Successful exploitation could allow att ...

oval:org.secpod.oval:def:3157
The host is installed with Apple Mac OS X 10.7.0 before 10.7.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle file deletions in directories with the sticky bit. Successful exploitation could allow attackers to bypass intended permiss ...

oval:org.secpod.oval:def:31530
The host is installed with Apple Mac OS X or Server 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted package that is mishandled during dispatch calls. Successful exploitation could allo ...

oval:org.secpod.oval:def:31524
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a double free vulnerability. A flaw is present in the application, which fails to handle a crafted app that accesses AtomicBufferedFile descriptors. Successful exploitation could allow attackers to write to ar ...

oval:org.secpod.oval:def:31525
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a double free vulnerability. A flaw is present in the application, which fails to handle a crafted app that accesses AtomicBufferedFile descriptors. Successful exploitation could allow attackers to write to ar ...

oval:org.secpod.oval:def:31526
The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted metadata in an image. Successful exploitation could allow remote attackers to execute arbitrary code o ...

oval:org.secpod.oval:def:31527
The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted metadata in an image. Successful exploitation could allow remote attackers to execute arbitrary code o ...

oval:org.secpod.oval:def:31520
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted SNMP trap message, which triggers a conversion to the variable type designated in the MIB file. Successf ...

oval:org.secpod.oval:def:31522
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle vectors involving NVRAM parameters. Successful exploitation could allow attackers to gain privileges.

oval:org.secpod.oval:def:31523
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to bypass an intended user-confirmation requireme ...

oval:org.secpod.oval:def:3150
The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.2 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted PNG image. Successful exploitation could allow attackers overwrite memory with an arbitrary amount of data.

oval:org.secpod.oval:def:31528
The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font file. Successful exploitation could allow remote attackers to execute arbitrary code or cause a ...

oval:org.secpod.oval:def:3151
The host is installed with Apple Mac OS X 10.7 before 10.7.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle Type 1 fonts. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:31529
The host is installed with Apple Mac OS X or Server 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font file. Successful exploitation could allow attackers to execute arbitrary code o ...

oval:org.secpod.oval:def:31513
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow local users to obtain sensitive information from ke ...

oval:org.secpod.oval:def:31514
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow local users to obtain sensitive information from ke ...

oval:org.secpod.oval:def:31515
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow local users to gain privileges or cause a denial of servi ...

oval:org.secpod.oval:def:31516
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code in a privileged conte ...

oval:org.secpod.oval:def:31510
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle crafted bookmark metadata in a folder. Successful exploitation could allow remote attackers to cause a denial of s ...

oval:org.secpod.oval:def:31511
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted font file. Successful exploitation could allow remote attackers to cause a denial of service (applicatio ...

oval:org.secpod.oval:def:31512
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted font file. Successful exploitation could allow remote attackers to cause a denial of service (applicatio ...

oval:org.secpod.oval:def:31517
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:31518
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation could allow attackers to cause a denial of service.

oval:org.secpod.oval:def:31519
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation could allow attackers to cause a denial of service.

oval:org.secpod.oval:def:3132
he host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.2 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to handle a crafted movie file. Successful exploitation could allow attackers to execute arbitrary code or crash t ...

oval:org.secpod.oval:def:3133
The host is installed with Apple Mac OS X 10.6.8 or 10.7 before 10.7.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle Location headers that specify redirection to file: URLs. Successful exploitation could allow attackers to crash ...

oval:org.secpod.oval:def:3130
The host is installed with Apple QuickTime in Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.2 and is prone to multiple vulnerabilities. A flaw is present in the application, which fails to handle the atom hierarchy in movie files. Successful exploitation could allow attackers to execute arbitrary code ...

oval:org.secpod.oval:def:3131
The host is installed with Apple Mac OS X 10.6.8 and is prone to a cross site scripting vulnerability. A flaw is present in the QuickTime Player's "Save for Web" application, which fails to remove reference to an online script. Successful exploitation could allow attackers to inject arbitrary code.

oval:org.secpod.oval:def:3136
The host is installed with Apple Mac OS X 10.6.8 and is prone to multiple STARTTLS command execution vulnerability. The flaws are present in the application, which fails to clearing the command queue after processing a STARTTLS command. Successful exploitation could allow attackers to obtain sensiti ...

oval:org.secpod.oval:def:3137
The host is installed with Apple Mac OS X 10.6.8 and is prone to denial of service vulnerability. The flaw is caused due to integer signedness error in zip_stream.c in the Zip extension. Successful exploitation could allow remote attackers to cause a denial of service via a malformed archive file th ...

oval:org.secpod.oval:def:3134
The host is installed with Apple Mac OS X 10.6.8 or 10.7 before 10.7.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to verify the relationships between size arguments and byte string lengths. Successful exploitation could allow attackers to cr ...

oval:org.secpod.oval:def:3135
The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.2 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle a large fragment, as demonstrated by a call to audioop.lin2lin with a long string in the first argument. Successful ...

oval:org.secpod.oval:def:3138
The host is installed with Apple Mac OS X and is prone to denial of Service vulnerability. The flaw is present in stream_get_contents function, which fails to handle ziparchive stream. Successful exploitation could allow remote attackers to cause a denial of service via a ziparchive stream.

oval:org.secpod.oval:def:3139
The host is installed with Apple Mac OS X 10.6.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle streams component properly. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:31502
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a symlink attack vulnerability. A flaw is present in the application, which fails to properly handle a crafted app. Successful exploitation could allow remote attackers to write to arbitrary ...

oval:org.secpod.oval:def:31503
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted web site. Successful exploitation could allow remote attackers to execute ar ...

oval:org.secpod.oval:def:31504
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted app. Successful exploitation could allow remote attackers to execute arbitrary code.

oval:org.secpod.oval:def:31505
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to properly handle a crafted CPIO archive. Successful exploitation could allow remote attackers to execute arbitrary code.

oval:org.secpod.oval:def:31500
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted metadata in an image. Successful exploitation could allow remote attackers to ...

oval:org.secpod.oval:def:31501
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted app. Successful exploitation could allow remote attackers to execute arbitra ...

oval:org.secpod.oval:def:31506
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a cookie overwrite execution vulnerability. A flaw is present in the application, which does not properly consider the uppercase-versus-lowercase distinction during cookie parsing. Successful exploitation coul ...

oval:org.secpod.oval:def:31507
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted app that sends a spoofed configd response to a client. Successful exploitation could allow remo ...

oval:org.secpod.oval:def:31508
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted font file. Successful exploitation could allow remote attackers to execute arbitrary code or cause a den ...

oval:org.secpod.oval:def:31509
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation could allow remote attackers to execute arbitrary code or cause a denial of ...

oval:org.secpod.oval:def:3143
The host is installed with Apple Mac OS X 10.6.8 and is prone to integer overflow vulnerability. A flaw in present in ext/shmop/shmop.c, which fails to handle overly long arguments passed to shmop_read() function. Successful exploitation could allow remote attackers to execute arbitrary code or caus ...

oval:org.secpod.oval:def:3144
The host is installed with Apple Mac OS X and is prone to a denial of Service vulnerability. The flaw is present exif.c in the Exif extension in PHP , which performs an incorrect cast. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3141
The host is installed with Apple Mac OS X 10.6.8 and is prone to denial of Service vulnerability. The flaw is caused due to integer overflow in the SdnToJulian function in the Calendar extension in PHP. Successful exploitation could allow remote attackers to cause a denial of service via a large int ...

oval:org.secpod.oval:def:3142
The host is installed with Apple Mac OS X 10.6.8 and is prone to format string vulnerability. A flaw in present in phar_object.c, which improperly calls zend_throw_exception_ex() function when format string specifiers are passed in an argument to a class method. Successful exploitation could allow r ...

oval:org.secpod.oval:def:3148
The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle invalid sCAL chunks. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3145
The host is installed with Apple Mac OS X 10.6.8 and is prone to denial of service vulnerability. The flaw is present in _zip_name_locate function in zip_name_locate.c in the Zip extension, which fails to handle a ZIPARCHIVE::FL_UNCHANGED argument. Successful exploitation could allow attackers to cr ...

oval:org.secpod.oval:def:3146
The host is installed with Apple Mac OS X 10.6.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle an invalid size argument, which triggers a NULL pointer dereference. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3149
The host is installed with Apple Mac OS X 10.6.8 or 10.7 before 10.7.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a function call using a NULL pointer argument instead of an empty-string argument. Successful exploitation could allow ...

oval:org.secpod.oval:def:30643
The host is missing a security update according to Apple advisory, APPLE-SA-2015-10-21-7. The update is required to fix an unspecified vulnerability. A flaw is present in the application, which mishandles type conversion. Successful exploitation allows attackers to cause unspecified impact.

oval:org.secpod.oval:def:3140
The host is installed with Apple Mac OS X 10.6.8 and is prone to Denial of Service vulnerability. The flaw is due to unspecified vulnerability in the NumberFormatter::setSymbol in the Intl extension in PHP. Successful exploitation could allow remote attackers to cause a denial of service via an inva ...

oval:org.secpod.oval:def:3110
The host is installed with Apple Mac OS X 10.6.8 and is prone to an out-of-bounds memory access vulnerability. A flaw is present in the application, which fails to handle embedded Type 1 fonts. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:3114
The host is installed with Apple Mac OS X 10.6.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to validate DNSSEC (1) NSEC and (2) NSEC3 records. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3115
The host is installed with Apple Mac OS X 10.6.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle the combination of signed negative responses and corresponding RRSIG records in the cache. Successful exploitation could allow attackers to ...

oval:org.secpod.oval:def:3112
The host is installed with Apple Mac OS X 10.7 before 10.7.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted update request. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3113
The host is installed with Apple Mac OS X 10.6.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a recursive client query and a response that contains an Additional section with crafted data. Successful exploitation could allow attackers ...

oval:org.secpod.oval:def:3118
The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.2 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle H.264 encoded movie files. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

oval:org.secpod.oval:def:3119
The host is installed with Quicktime in Apple Mac OS X 10.6.8 or 10.7 before 10.7.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle URL data handlers within movie files. Successful exploitation could allow attackers to disclose mem ...

oval:org.secpod.oval:def:3117
The host is installed with Apple Mac OS X and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted FlashPix file. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3121
The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.2 and is prone to an buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted FLIC movie file. Successful exploitation could allow attackers to execute arbitrary code or crash the servi ...

oval:org.secpod.oval:def:3122
The host is installed with Apple Mac OS X 10.7.0 before 10.7.2 and is prone to a improper access control vulnerability. A flaw is present in the application, which fails to prevent _unknown user from browsing the share point but not guests. Successful exploitation could allow attackers to access sha ...

oval:org.secpod.oval:def:3120
The host is installed with Apache Tomcat in Apple Mac OS X and is prone to security bypass vulnerability. A flaw is present in SecurityManager, which fails to make ServletContext attribute read-only thus allowing local web applications to read or write files outside the intended working directory. S ...

oval:org.secpod.oval:def:3125
The host is installed with Apache Tomcat in Apple Mac OS X and is prone to multiple cross-site scripting (XSS) vulnerabilities. The flaws are present in the application which fails to properly filter HTML code from user-supplied input before displaying the input. Successful exploitation allows remot ...

oval:org.secpod.oval:def:3126
The host is installed with Apache Tomcat and is prone to multiple cross site scripting vulnerabilities. Flaws are present in the HTML Manager Interface, which fails to properly validate user supplied input before using it in dynamically generated content. Successful exploitation allows remote attack ...

oval:org.secpod.oval:def:3123
The host is installed with Apache Tomcat in Apple Mac OS X and is prone to multiple vulnerabilities.. A flaw is present in the application, which fails to handle an invalid Transfer-Encoding header. Successful exploitation could allow attackers to crash the service or obtain sensitive information.

oval:org.secpod.oval:def:3124
The host is installed with Apache Tomcat in Apple Mac OS X 10.6.8 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a request for a resource that requires (1) BASIC or (2) DIGEST authentication. Successful exploitation could allow at ...

oval:org.secpod.oval:def:3127
The host is installed with Apache Tomcat in Apple Mac OS X and is prone to denial of service vulnerability. A flaw is present in the application which is caused by an error in the NIO connector when processing a request line. Successful exploitation allow remote attackers to cause an OutOfMemory err ...

oval:org.secpod.oval:def:3128
The host is installed with Apple Mac OS X 10.6.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which updates App Store help content over HTTP. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:3108
The host is installed with Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle multiple overlapping ranges. Successful exploitation could allow attackers to crash the s ...

oval:org.secpod.oval:def:3109
The host is installed with Apple Mac OS X before 10.7.2 and is prone to format string vulnerability. A flaw is present in the application, which fails to handle a crafted name of an executable file. Successful exploitation could allow attackers to gain elevated privileges.

oval:org.secpod.oval:def:31531
The host is installed with Apple Mac OS X or Server 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted developer-signed app. Successful exploitation could allow attackers to bypass intend ...

oval:org.secpod.oval:def:31532
The host is installed with Apple Mac OS X or Server 10.10.5 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly process Mach task. Successful exploitation could allow attackers to bypass intended entitlement restrictions and gain privil ...

oval:org.secpod.oval:def:30897
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation could allow remote attackers to execute arbitrary code.

oval:org.secpod.oval:def:30898
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a code-signing protection mechanism vulnerability. A flaw is present in the application, which fails to properly handle an app that places a crafted signature in an executable file. Successful exploitation could ...

oval:org.secpod.oval:def:30899
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation could allow remote attackers to execute arbitrary code with system privilege ...

oval:org.secpod.oval:def:30893
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a crafted web site. Successful exploitation could allow attackers to bypass the Safari private-browsing protec ...

oval:org.secpod.oval:def:30894
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a cookie-injection attack vulnerability. A flaw is present in the application, which fails to properly handle a crafted response. Successful exploitation could allow remote proxy servers to conduct cookie-injecti ...

oval:org.secpod.oval:def:30895
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a man-in-the-middle attack vulnerability. A flaw is present in the application, which fails to properly handle a crafted certificate. Successful exploitation could allow remote attackers to spoof servers and obta ...

oval:org.secpod.oval:def:30896
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly process font files. Successful exploitation could allow remote attackers to execute arbitrary code.

oval:org.secpod.oval:def:30890
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle top level domains. Successful exploitation could allow attackers in a privileged network position to trac ...

oval:org.secpod.oval:def:30891
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle FTP packets when using the PASV command. Successful exploitation could allow attackers to cause the cl ...

oval:org.secpod.oval:def:30892
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a HSTS protection mechanism bypass vulnerability. A flaw is present in the application, which fails to properly handle a crafted URL. Successful exploitation could allow attackers to bypass the HSTS protection me ...

oval:org.secpod.oval:def:30886
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a crafted second argument. Successful exploitation could allow attackers to bypass intended extension restrict ...

oval:org.secpod.oval:def:30887
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a crafted app. Successful exploitation could allow attackers to obtain access to keychain items.

oval:org.secpod.oval:def:30888
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle attempts to send events to a different user. Successful exploitation could allow attackers to bypass intended ...

oval:org.secpod.oval:def:30889
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle audio files. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:30882
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a NULL pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle a crafted name. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:30884
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a large regular expression. Successful exploitation could allow attackers to execute arbitrary code ...

oval:org.secpod.oval:def:30885
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle a ZIP archive that contains many entries. Successful exploitation could allow attackers to execute arbitrary ...

oval:org.secpod.oval:def:30881
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:30875
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly process an invalid file that begins with a # character and lacks a newline character. Successful exploitation cou ...

oval:org.secpod.oval:def:30876
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an out-of-bounds memory access vulnerability. A flaw is present in the application, which fails to properly handle a crafted file. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:30873
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle an environment variable. Successful exploitation could allow attackers to inject arbitrary code.

oval:org.secpod.oval:def:30874
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly process eSCL packets. Successful exploitation could allow attackers to extract payload from eSCL packets sent ...

oval:org.secpod.oval:def:30879
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle a crafted unserialize call. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:30910
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a kernel memory-layout information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow local users to obtain sen ...

oval:org.secpod.oval:def:30911
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow local users to gain privileges or cause a denial of ...

oval:org.secpod.oval:def:30916
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted app. Successful exploitation allow attackers to execute arbitrary code in a privileged context or ca ...

oval:org.secpod.oval:def:30917
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted app. Successful exploitation allow attackers to execute arbitrary code in a privileged context or ca ...

oval:org.secpod.oval:def:30918
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly initialize an unspecified data structure. Successful exploitation could allow local users to obtain sensitive ...

oval:org.secpod.oval:def:30919
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allow local users to gain privileges or cause a denial of servi ...

oval:org.secpod.oval:def:30912
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow local users to gain privileges or cause a denial of ...

oval:org.secpod.oval:def:30913
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow local users to gain privileges or cause a denial of ...

oval:org.secpod.oval:def:30914
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow local users to gain privileges or cause a denial of ...

oval:org.secpod.oval:def:30915
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a kernel memory-layout information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted app. Successful exploitation allow attackers to obtain sensitive kernel ...

oval:org.secpod.oval:def:30909
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to gain privileges or crash the service.

oval:org.secpod.oval:def:30900
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted app that writes to an unintended address. Successful exploitation could allow remote attackers to ...

oval:org.secpod.oval:def:30908
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a privileged executable. Successful exploitation could allow attackers to gain root privileges.

oval:org.secpod.oval:def:30901
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle an Apple Ethernet Thunderbolt adapter with crafted code in an Option ROM. Successful exploitation could allow ...

oval:org.secpod.oval:def:30902
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly delete Trash files. Successful exploitation could allow local users to obtain sensitive information by readin ...

oval:org.secpod.oval:def:30903
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted Game Center app. Successful exploitation could allow attackers to discover the e-mail addres ...

oval:org.secpod.oval:def:30904
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a replay attack vulnerability. A flaw is present in the application, which fails to properly handle a packet data that represents a Kerberos authenticated request. Successful exploitation could allow attackers to ...

oval:org.secpod.oval:def:3048
The host is installed with Mac OS X 10.5.8 or 10.6 through 10.6.6 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted SHZ bytecode instruction. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3049
The host is installed with FreeType 2.4.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle ft_var readpackedpoints function. Successful exploitation could allow attackers to cause buffer overflow.

oval:org.secpod.oval:def:30952
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a kernel memory-layout information disclosure vulnerability. A flaw is present in the application, which fails to properly perform bounds checking. Successful exploitation could allow attackers to determine kerne ...

oval:org.secpod.oval:def:30953
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 or Apple iTunes before 12.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted COLLATE clause. Successful exploitation could allow attackers to crash ...

oval:org.secpod.oval:def:30954
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 or Apple iTunes before 12.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle via a crafted CHECK clause. Successful exploitation could allow context-dependen ...

oval:org.secpod.oval:def:30955
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 or Apple iTunes before 12.6 and is prone to an integer and stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle large integers in a crafted printf function call in a SEL ...

oval:org.secpod.oval:def:30950
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle crafted TLS data. Successful exploitation could allow attackers to have an unspecified impact.

oval:org.secpod.oval:def:30951
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation could allow attackers to execute arbitrary code with kernel privileges.

oval:org.secpod.oval:def:30956
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow local users to bypass intended telephone-call restric ...

oval:org.secpod.oval:def:30957
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a content spoofing vulnerability. A flaw is present in the application, which fails to properly interpret directional override formatting characters differently. Successful exploitation could allow remote attacke ...

oval:org.secpod.oval:def:30958
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle vectors involving a command character in an href. Successful exploitation could allow remote attack ...

oval:org.secpod.oval:def:30959
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle vectors involving multiple whitespace characters before an empty href. Successful exploitation coul ...

oval:org.secpod.oval:def:30941
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allow remote attackers to crash the service.

oval:org.secpod.oval:def:30942
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted email header. Successful exploitation allow remote attackers to crash the service or exec ...

oval:org.secpod.oval:def:30943
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle vectors involving environment variables. Successful exploitation allow local users to obtain root privile ...

oval:org.secpod.oval:def:30944
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle malicious data. Successful exploitation allow attackers to crash the service.

oval:org.secpod.oval:def:30940
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly support wildcards on AcceptEnv lines in sshd_config. Successful exploitation allow remote attackers to bypass intende ...

oval:org.secpod.oval:def:30949
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a man-in-the-middle attack vulnerability. A flaw is present in the application, which fails to properly recognize that the kSecRevocationRequirePositiveResponse flag implies a revocation-checking requirement. Suc ...

oval:org.secpod.oval:def:30945
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted XML document. Successful exploitation allow attackers to crash the service.

oval:org.secpod.oval:def:30946
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted XML document containing an empty string. Successful exploitation allow attackers to crash the serv ...

oval:org.secpod.oval:def:30947
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an improper hostname verification vulnerability. A flaw is present in the application, which fails to properly match hostnames. Successful exploitation could cause Ruby TLS/SSL clients to accept certain certifica ...

oval:org.secpod.oval:def:30948
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly display lock state of the keychain. Successful exploitation could allow attackers to produce unspecified impact.

oval:org.secpod.oval:def:30930
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly validate crafted data. Successful exploitation allow local users to crash the service.

oval:org.secpod.oval:def:30931
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly set limit on the number of processes that could be started by a network connection. Successful exploitation allow a ...

oval:org.secpod.oval:def:30932
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly ensure that the screen is locked at the intended time. Successful exploitation allow attackers to obtain access ...

oval:org.secpod.oval:def:30933
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly perform glob validation. Successful exploitation allow attackers to crash the service.

oval:org.secpod.oval:def:30938
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to parse links. Successful exploitation allow attackers to obtain sensitive information.

oval:org.secpod.oval:def:30939
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly perform input validation. Successful exploitation allow attackers to leak sensitive user information.

oval:org.secpod.oval:def:30935
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a large attachment. Successful exploitation allow attackers to obtain sensitive information by sniffin ...

oval:org.secpod.oval:def:30936
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a downgrade attack. Successful exploitation allow local users to obtain cleartext multipeer data.

oval:org.secpod.oval:def:30937
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory layout information disclosure vulnerability. A flaw is present in the application, which fails to properly initialize an unspecified data structure. Successful exploitation allow attackers to obtain sens ...

oval:org.secpod.oval:def:30920
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allow local users to gain privileges or cause a denial of servi ...

oval:org.secpod.oval:def:30921
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allow local users to gain privileges or cause a denial of servi ...

oval:org.secpod.oval:def:30922
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an entitlement protection mechanism bypass vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation allow local users to bypass an entitlement prot ...

oval:org.secpod.oval:def:30927
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory-layout information disclosure vulnerability. A flaw is present in the application, which fails to properly sanitize outputs from debugging interfaces. Successful exploitation allow local users to determi ...

oval:org.secpod.oval:def:30928
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly validate crafted data. Successful exploitation allow local users to crash the service.

oval:org.secpod.oval:def:30929
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly validate crafted data. Successful exploitation allow local users to crash the service.

oval:org.secpod.oval:def:30923
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a cookie randomization bypass vulnerability. A flaw is present in the application, which fails to properly handle crafted Apple strings employed in the user-space stack-cookie implementation. Successful exploitat ...

oval:org.secpod.oval:def:30924
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a TCP connection disruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted header. Successful exploitation allow remote attackers to bypass the sequence-number prote ...

oval:org.secpod.oval:def:30925
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a small hop_limit value in a Router Advertisement (RA) message. Successful exploitation allow remote atta ...

oval:org.secpod.oval:def:30926
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory-layout information disclosure vulnerability. A flaw is present in the application, which fails to properly initialize an unspecified data structure. Successful exploitation allow local users to obtain se ...

oval:org.secpod.oval:def:30960
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow local users to obtain access to keychain items.

oval:org.secpod.oval:def:31494
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font file. Successful exploitation could allow remote attackers to execute a ...

oval:org.secpod.oval:def:31495
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font file. Successful exploitation could allow remote attackers to execute a ...

oval:org.secpod.oval:def:31496
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font file. Successful exploitation could allow remote attackers to execute a ...

oval:org.secpod.oval:def:31497
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font file. Successful exploitation could allow remote attackers to execute a ...

oval:org.secpod.oval:def:31490
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font file. Successful exploitation could allow remote attackers to execute a ...

oval:org.secpod.oval:def:31491
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font file. Successful exploitation could allow remote attackers to execute a ...

oval:org.secpod.oval:def:31492
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font file. Successful exploitation could allow remote attackers to execute a ...

oval:org.secpod.oval:def:31493
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font file. Successful exploitation could allow remote attackers to execute a ...

oval:org.secpod.oval:def:31487
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle unused EFI functions. Successful exploitation could allow remote attackers to reach "unu ...

oval:org.secpod.oval:def:31488
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted font file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:31489
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font file. Successful exploitation could allow remote attackers to execute a ...

oval:org.secpod.oval:def:31483
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted audio file. Successful exploitation could allow remote attackers to execute ...

oval:org.secpod.oval:def:31484
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted web site. Successful exploitation could allow remote attackers to execute ar ...

oval:org.secpod.oval:def:31485
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted web site. Successful exploitation could allow remote attackers to execute ar ...

oval:org.secpod.oval:def:31486
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font file. Successful exploitation could allow remote attackers to execute a ...

oval:org.secpod.oval:def:31480
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a NULL pointer dereference vulnerability. A flaw is present in the PHP XSLTProcessor class, which fails to properly handle NULL pointer returned the valuePop() function. Successful exploitat ...

oval:org.secpod.oval:def:31481
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted webpage. Successful exploitation could allow remote attackers to ...

oval:org.secpod.oval:def:31482
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted audio file. Successful exploitation could allow remote attackers to execute ...

oval:org.secpod.oval:def:31476
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unserializing objects. Successful exploitation could allow remote attackers to cause P ...

oval:org.secpod.oval:def:31477
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unserializing objects. Successful exploitation could allow remote attackers to cause P ...

oval:org.secpod.oval:def:31478
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a denial of service vulnerability. A flaw is present in the PHP Soap client, which incorrectly validate data types. Successful exploitation could allow remote attackers to cause PHP to crash ...

oval:org.secpod.oval:def:31479
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a denial of service vulnerability. A flaw is present in the PHP XSLTProcessor class, which fails to properly handle certain data. Successful exploitation could allow remote attackers to caus ...

oval:org.secpod.oval:def:31473
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font file. Successful exploitation could allow attackers to execute arbitrar ...

oval:org.secpod.oval:def:31474
The host is installed with Apple Mac OS X or Server 10.6.8 through 10.8.x, 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle vectors related to the (1) gethostbyname or (2) gethos ...

oval:org.secpod.oval:def:31498
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted metadata in an image. Successful exploitation could allow remote attackers to ...

oval:org.secpod.oval:def:31499
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted metadata in an image. Successful exploitation could allow remote attackers to ...

oval:org.secpod.oval:def:3158
The host is installed with Apple Mac OS X 10.7.0 before 10.7.2 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to prevent FireWire DMA in the absence of a login. Successful exploitation could allow attackers to bypass intended access restrictions.

oval:org.secpod.oval:def:3165
The host is installed with Apple Mac OS X 10.6.8 or iTunes before 10.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly perform string tokenization. Successful exploitation could allow attackers to crash the service or execute arbitrary ...

oval:org.secpod.oval:def:3166
The host is installed with Apple Mac OS X 10.7 before 10.7.3 and is prone to a information disclosure vulnerability. A flaw is present in the application, which fails to restrict transmission of cookies. Successful exploitation could allow attackers to obtain sensitive information.

oval:org.secpod.oval:def:3163
The host is installed with Apple Mac OS X 10.7 before 10.7.2 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to prevent system windows from requesting keystrokes while the screen is locked. Successful exploitation could allow attackers to partially ...

oval:org.secpod.oval:def:3164
The host is installed with Apple Mac OS X 10.6.8 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle crafted QuickTime movie files. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3169
The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.2 and is prone to multiple memory corruption vulnerabilities. The flaw are present in the applications, which fails to handle crafted input. Successful exploitation could allow attackers to overflow the buffer, execute arbitrary ...

oval:org.secpod.oval:def:3167
The host is installed with Apple Mac OS X 10.6.8 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle cookies properly. Successful exploitation could allow attackers to set cookies that would be blocked were the preference enforced.

oval:org.secpod.oval:def:3168
The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.2 and is prone to a buffer overflow vulnerability. The flaw is present in the application, which fails to handle API in Apple Type Services (ATS). Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3161
The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.2 and is prone to a stack consumption vulnerability. A flaw is present in the application, which fails to properly track the specific X.509 certificate that a user manually accepted for an initial https WebDAV connection. Success ...

oval:org.secpod.oval:def:3162
The host is installed with Apple Mac OS X 10.7.0 before 10.7.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to ensure that all disk data is encrypted during the enabling of FileVault. Successful exploitation could allow attackers to obtai ...

oval:org.secpod.oval:def:3160
The host is installed with Apple Mac OS X 10.6.8 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a locked-screen state in display sleep mode for an Apple Cinema Display. Successful exploitation could allow attackers to bypass the password ...

oval:org.secpod.oval:def:32698
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows local user to execute arbitrary code with root privileges.

oval:org.secpod.oval:def:32699
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle search order or quarantine checks improved memory. Successful exploitation allows attackers to override OSA scr ...

oval:org.secpod.oval:def:32702
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows local users to execute arbitrary code with kernel privileges.

oval:org.secpod.oval:def:32701
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows local users to execute arbitrary code with kernel privileges.

oval:org.secpod.oval:def:32704
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows local users to execute arbitrary code with kernel privileges.

oval:org.secpod.oval:def:32703
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows local users to execute arbitrary code with kernel privileges.

oval:org.secpod.oval:def:32706
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows local users to execute arbitrary code with kernel privileges.

oval:org.secpod.oval:def:32705
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows local users to execute arbitrary code with kernel privileg ...

oval:org.secpod.oval:def:34185
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to properly handle a Trojan horse program that is loaded from an unexpected directory by an application that has a vali ...

oval:org.secpod.oval:def:34186
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow local users to gain privileges.

oval:org.secpod.oval:def:34626
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ...

oval:org.secpod.oval:def:34624
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary co ...

oval:org.secpod.oval:def:34622
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ...

oval:org.secpod.oval:def:34623
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an out of bounds vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to determine kernel memory layout.

oval:org.secpod.oval:def:34620
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:34621
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:34619
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ...

oval:org.secpod.oval:def:34642
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ...

oval:org.secpod.oval:def:34643
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:34640
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:34641
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to cause a denial of ser ...

oval:org.secpod.oval:def:34639
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ke ...

oval:org.secpod.oval:def:34637
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ...

oval:org.secpod.oval:def:34638
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to cause denial of servi ...

oval:org.secpod.oval:def:34635
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ...

oval:org.secpod.oval:def:34636
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a security key encryption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to cause unspecified impa ...

oval:org.secpod.oval:def:34633
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary co ...

oval:org.secpod.oval:def:34634
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to read kernel memory.

oval:org.secpod.oval:def:34631
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ...

oval:org.secpod.oval:def:34632
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary co ...

oval:org.secpod.oval:def:34630
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:34628
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to leak sensitive user in ...

oval:org.secpod.oval:def:34629
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to leak sensitive user in ...

oval:org.secpod.oval:def:34677
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to leak sensitive user in ...

oval:org.secpod.oval:def:34675
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to cause unexpected application ...

oval:org.secpod.oval:def:34676
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to reset an expired password from th ...

oval:org.secpod.oval:def:34674
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to cause unexpected application ...

oval:org.secpod.oval:def:34671
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to modify another user's contact lis ...

oval:org.secpod.oval:def:34670
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to leak sensitive user in ...

oval:org.secpod.oval:def:34669
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to leak sensitive user in ...

oval:org.secpod.oval:def:34659
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to cause unexpected application ...

oval:org.secpod.oval:def:34657
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ...

oval:org.secpod.oval:def:34658
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ...

oval:org.secpod.oval:def:34655
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ...

oval:org.secpod.oval:def:34656
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ...

oval:org.secpod.oval:def:34653
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ...

oval:org.secpod.oval:def:34654
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ...

oval:org.secpod.oval:def:34651
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ...

oval:org.secpod.oval:def:34652
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ...

oval:org.secpod.oval:def:34650
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ...

oval:org.secpod.oval:def:34648
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:34649
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ...

oval:org.secpod.oval:def:34646
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ...

oval:org.secpod.oval:def:34647
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ke ...

oval:org.secpod.oval:def:34644
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ...

oval:org.secpod.oval:def:34645
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ...

oval:org.secpod.oval:def:3510
The host is installed with Apple Mac OS X 10.5.8 or 10.6.2 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle vectors that trigger memory corruption. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:3511
The host is installed with Apple Mac OS X 10.5.8 or 10.6.2 and is prone to an integer overflow vulnerability. A flaw is present in the applications, which fail to handle a SWF file with a large exception_count value. Successful exploitation could allow attackers to cause memory corruption.

oval:org.secpod.oval:def:3509
The host is installed with Apple Mac OS X 10.5.8 or 10.6.2 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle vectors that trigger memory corruption. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:3500
The host is installed with Apple Mac OS X 10.6.x through 10.6.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle errors. Successful exploitation could allow attackers to bypass the password requirement for shared-folder.

oval:org.secpod.oval:def:3503
The host is installed with Apple Mac OS X 10.5.8 or 10.6.2 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle abstract file-descriptor handling interface in the cupsdDoSelect. Successful exploitation could allow attackers to crash the service ...

oval:org.secpod.oval:def:3501
The host is installed with Apple Mac OS X 10.6.x through 10.6.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle errors. Successful exploitation could allow attackers to bypass the password requirement for shared-folder.

oval:org.secpod.oval:def:3502
The host is installed with Apple Mac OS X 10.5.8 or 10.6.2 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted MP4 audio file. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3505
The host is installed with Apple Mac OS X 10.5.8 or 10.6.2 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted DNG image. Successful exploitation could allow attackers to overflow the buffer.

oval:org.secpod.oval:def:3506
The host is installed with Apple Mac OS X 10.5.8 or 10.6.2 and is prone to an man-in-the-middle vulnerability. A flaw is present in the applications, which fail to handle properly associate renegotiation handshakes with an existing connection. Successful exploitation could allow attackers to attacke ...

oval:org.secpod.oval:def:37316
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code.

oval:org.secpod.oval:def:37315
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle firewall prompts. Successful exploitation could allow remote attackers to cause a denial of service.

oval:org.secpod.oval:def:37314
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with kernel privileg ...

oval:org.secpod.oval:def:37313
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with kernel privileg ...

oval:org.secpod.oval:def:37312
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with system ...

oval:org.secpod.oval:def:37311
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with kernel privileg ...

oval:org.secpod.oval:def:37310
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with kernel p ...

oval:org.secpod.oval:def:37309
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle HTTP_PROXY environment variable. Successful exploitation could allow remote attackers to proxy traffic through a ...

oval:org.secpod.oval:def:37307
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to multiple security information disclosure vulnerability. The flaws are present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to compromise securit ...

oval:org.secpod.oval:def:37352
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an untrusted pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ke ...

oval:org.secpod.oval:def:37351
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an out of bounds read vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to determine kernel memory layout or may dis ...

oval:org.secpod.oval:def:37350
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with kernel privileg ...

oval:org.secpod.oval:def:37357
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected application termination or arbitrary code execut ...

oval:org.secpod.oval:def:37355
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code.

oval:org.secpod.oval:def:37354
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code.

oval:org.secpod.oval:def:37353
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with ke ...

oval:org.secpod.oval:def:37341
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a security feature bypass vulnerability. A flaw is present in the application, which fails to properly handle parsing of environment variables. Successful exploitation could allow remote attackers to bypass the taint protect ...

oval:org.secpod.oval:def:37340
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle timing side channel. Successful exploitation could allow remote attackers to determine the existence of user accou ...

oval:org.secpod.oval:def:37349
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an out of bounds read vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to determine kernel memory layout or may dis ...

oval:org.secpod.oval:def:37348
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an out of bounds read vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to determine kernel memory layout or may dis ...

oval:org.secpod.oval:def:37347
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle lock. Successful exploitation could allow remote attackers to cause a denial of service.

oval:org.secpod.oval:def:37346
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly parse directory paths. Successful exploitation could allow remote attackers to access restricted files.

oval:org.secpod.oval:def:37345
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle .bash_history and .bash_session. Successful exploitation could allow remote attackers to leak sensitive user infor ...

oval:org.secpod.oval:def:37344
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with system privi ...

oval:org.secpod.oval:def:37343
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle key derivation. Successful exploitation could allow remote attackers to leak memory.

oval:org.secpod.oval:def:37342
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with kernel privileg ...

oval:org.secpod.oval:def:37339
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle state management in NSSecureTextField. Successful exploitation could allow remote attackers to leak a user's credenti ...

oval:org.secpod.oval:def:37330
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to properly handle Call Relay. Successful exploitation could allow remote attackers in a privileged network position may be able to cause a denial o ...

oval:org.secpod.oval:def:37338
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle VMnet.framework enabled a DNS proxy listening on all network interfaces. Successful exploitation could allow remot ...

oval:org.secpod.oval:def:37337
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted web content. Successful exploitation could allow remote attackers to execute arbitrary code.

oval:org.secpod.oval:def:37335
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with kernel privileg ...

oval:org.secpod.oval:def:37334
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with kernel privileg ...

oval:org.secpod.oval:def:37333
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted web content . Successful exploitation could allow remote attackers to disclosure process memory.

oval:org.secpod.oval:def:37332
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a NULL pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with kernel p ...

oval:org.secpod.oval:def:37331
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with kernel privileg ...

oval:org.secpod.oval:def:37329
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle font files. Successful exploitation could allow remote attackers may result in disclosure of process memory.

oval:org.secpod.oval:def:37328
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle scoped bookmarks. Successful exploitation could allow remote attackers to cause a denial of service.

oval:org.secpod.oval:def:37327
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle diskutil. Successful exploitation could allow remote attackers to execute arbitrary code with system privileges.

oval:org.secpod.oval:def:37326
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle .GlobalPreferences file. Successful exploitation could allow remote attackers to determine a user's current locati ...

oval:org.secpod.oval:def:37325
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle session management. Successful exploitation could allow remote attackers to view another user's screen.

oval:org.secpod.oval:def:37324
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code.

oval:org.secpod.oval:def:37323
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle corecrypto. Successful exploitation could allow remote attackers to disclose sensitive plaintext if the output and ...

oval:org.secpod.oval:def:37322
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to gain root privileges.

oval:org.secpod.oval:def:37321
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to gain root privileges.

oval:org.secpod.oval:def:37320
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly parse the set-cookie header. Successful exploitation could allow remote attackers to disclose information.

oval:org.secpod.oval:def:37319
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle deletion of Local Storage. Successful exploitation could allow remote attackers to cause information leak.

oval:org.secpod.oval:def:37318
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly validate input. Successful exploitation could allow remote attackers to cause a system denial of service.

oval:org.secpod.oval:def:37317
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code.

oval:org.secpod.oval:def:37362
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected application termination or arbitrary code execut ...

oval:org.secpod.oval:def:3734
The host is installed with Java for Mac OS X before 10.6 Update 3 and is prone to a arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle Mach RPC messages. Successful exploitation could allow attacker to execute arbitrary code.

oval:org.secpod.oval:def:36961
The host is missing a security update according to Apple advisory, APPLE-SA-2016-09-01-2. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to caus ...

oval:org.secpod.oval:def:36960
The host is installed with Apple Mac OS X or Server 10.10.5 before update 2016-005 or 10.11.6 before update 2016-001 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow ...

oval:org.secpod.oval:def:3738
The host is installed with Apple Mac OS X 10.6.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle anonymous SSL and TLS connections. Successful exploitation could man-in-the-middle attackers to redirect a connection and obt ...

oval:org.secpod.oval:def:3737
The host is installed with Apple Mac OS X 10.5.8 and 10.6.4 and is prone to a stack based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted embedded font in a document. Successful exploitation could allow attackers to execute arbitrary code or crash ...

oval:org.secpod.oval:def:36959
The host is installed with Apple Mac OS X or Server 10.10.5 before update 2016-005 or 10.11.6 before update 2016-001 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote ...

oval:org.secpod.oval:def:3547
The host is installed with Apple Mac OS X 10.5.8 or 10.6.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to affect confidentiality, integrity, and availability.

oval:org.secpod.oval:def:3546
The host is installed with Apple Mac OS X 10.5.8 or 10.6.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to affect confidentiality, integrity, and availability.

oval:org.secpod.oval:def:3513
The host is installed with Apple Mac OS X 10.5.8 or 10.6.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to which fails to sanitize user supplied input. Successful exploitation could allow attackers to obtain the names of local files via u ...

oval:org.secpod.oval:def:3521
The host is installed with Apple Mac OS X 10.5.8 or 10.6.3 and is prone to a heap overflow vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to overflow a buffer.

oval:org.secpod.oval:def:38537
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code with ke ...

oval:org.secpod.oval:def:34627
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.5 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to e ...

oval:org.secpod.oval:def:34625
The host is installed with Apple Mac OS X or Server 10.10.5 or 10.11.x before 10.11.5 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to cause a de ...

oval:org.secpod.oval:def:34618
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.5 and is prone to an information disclosure of kernel memory content vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allo ...

oval:org.secpod.oval:def:34673
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute a ...

oval:org.secpod.oval:def:34672
The host is installed with Apple Mac OS X or Server 10.10.5 or 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary ...

oval:org.secpod.oval:def:34668
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute a ...

oval:org.secpod.oval:def:37843
The host is missing a critical security update according to Apple advisory, APPLE-SA-2016-10-24-2. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute a ...

oval:org.secpod.oval:def:37842
The host is installed with Apple Mac OS X or Server 10.12 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to disclosure of password length.

oval:org.secpod.oval:def:37841
The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected system termination or arbitrar ...

oval:org.secpod.oval:def:37840
The host is installed with Apple Mac OS X or Server 10.11.6 or 10.10.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to denial of service.

oval:org.secpod.oval:def:37839
The host is installed with Apple Mac OS X or Server 10.12 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to denial of service.

oval:org.secpod.oval:def:37838
The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to execute arbitrary code with root privileg ...

oval:org.secpod.oval:def:37837
The host is installed with Apple Mac OS X or Server 10.12 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to arbitrary code execution.

oval:org.secpod.oval:def:37836
The host is installed with Apple Mac OS X or Server 10.11.6 or 10.10.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to disclosure of sensitive information.

oval:org.secpod.oval:def:37835
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted PDF. Successful exploitation may lead to arbitrary code execution.

oval:org.secpod.oval:def:37834
The host is installed with Apple Mac OS X or Server 10.12 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted font. Successful exploitation may lead to disclose sensitive user information.

oval:org.secpod.oval:def:3771
The host is installed with Apple Mac OS X 10.6 before 10.6.3 or Apple Quicktime 7.6.6 and is prone to a buffer overflow vulnerability. A flaw is present in the applications, which fail to handle a malformed .3g2 movie file. Successful exploitation could allow attackers to trigger an incorrect buffer ...

oval:org.secpod.oval:def:3774
The host is installed with Apple Mac OS X 10.6 before 10.6.3 or Apple Quicktime 7.6.6 and is prone to a buffer overflow vulnerability. A flaw is present in the applications, which fail to handle a crafted movie file with RLE encoding. Successful exploitation could allow attackers to trigger memory c ...

oval:org.secpod.oval:def:3775
The host is installed with Apple Mac OS X 10.6 before 10.6.3 or Apple Quicktime 7.6.6 and is prone to a buffer overflow vulnerability. A flaw is present in the applications, which fail to handle a malformed movie file. Successful exploitation could allow attackers to trigger an incorrect buffer leng ...

oval:org.secpod.oval:def:3772
The host is installed with Apple Mac OS X 10.6 before 10.6.3 or Apple Quicktime 7.6.6 and is prone to a buffer overflow vulnerability. A flaw is present in the applications, which fail to handle a crafted movie file with H.261 encoding. Successful exploitation could allow attackers to crash the serv ...

oval:org.secpod.oval:def:3773
The host is installed with Apple Mac OS X 10.6 before 10.6.3 or Apple Quicktime 7.6.6 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle a crafted movie file with H.264 encoding. Successful exploitation could allow attackers to execute arbi ...

oval:org.secpod.oval:def:3778
The host is installed with Apple Mac OS X 10.6 before 10.6.3 or Apple Quicktime 7.6.6 and is prone to a buffer overflow vulnerability. A flaw is present in the applications, which fail to handle a crafted genl atom in a QuickTime movie file with MPEG encoding. Successful exploitation could allow att ...

oval:org.secpod.oval:def:3776
The host is installed with Apple Mac OS X 10.6 before 10.6.3 or Apple Quicktime 7.6.6 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle a crafted movie file with Sorenson encoding. Successful exploitation could allow attackers to crash the ...

oval:org.secpod.oval:def:3777
The host is installed with Apple Mac OS X 10.6 before 10.6.3 or Apple Quicktime 7.6.6 and is prone to a buffer overflow vulnerability. A flaw is present in the applications, which fail to handle DELTA_FLI chunks and untrusted length values in a .fli file. Successful exploitation could allow attacker ...

oval:org.secpod.oval:def:37833
The host is installed with Apple Mac OS X or Server 10.12 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to cause a relayed call to continue transmitting audio while appearing as if ...

oval:org.secpod.oval:def:37832
The host is installed with Apple Mac OS X or Server 10.12 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted JPEG file. Successful exploitation may lead to arbitrary code execution.

oval:org.secpod.oval:def:37831
The host is installed with Apple Mac OS X or Server 10.12 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle proxy credentials. Successful exploitation may be able to leak sensitive user information.

oval:org.secpod.oval:def:37830
The host is installed with Apple Mac OS X or Server 10.12 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to arbitrary code execution with additional privileges.

oval:org.secpod.oval:def:37829
The host is installed with Apple Mac OS X or Server 10.12 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted font file. Successful exploitation may lead to arbitrary code execution.

oval:org.secpod.oval:def:37828
The host is installed with Apple Mac OS X or Server 10.12 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to elevate privileges.

oval:org.secpod.oval:def:37827
The host is installed with Apple Mac OS X or Server 10.11.6 or 10.10.5 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to arbitrary code execution.

oval:org.secpod.oval:def:3768
The host is installed with Apple Quicktime before 7.7.6 or Apple Mac OS X 10.5.8 or 10.6 before 10.6.2 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted PICT image. Successful exploitation could allow attackers to crash ...

oval:org.secpod.oval:def:3769
The host is installed with Apple Mac OS X before 10.6.3 or Quicktime before 7.7.6 and is prone to a denial of service vulnerability. A flaw is present in the applications, which fails to handle crafted audio content with QDM2 encoding. Successful exploitation could allow attackers to crash the servi ...

oval:org.secpod.oval:def:3741
The host is installed with Apple Mac OS X 10.5.8 or 10.6.4 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted PDF file. Successful exploitation could attackers to crash the service.

oval:org.secpod.oval:def:3742
The host is installed with Apple Mac OS X 10.5.8 or 10.6.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly perform comparisons to domain-name strings in X.509 certificates. Successful exploitation could allow man-in-the-middle attackers ...

oval:org.secpod.oval:def:3745
The host is installed with Apple Mac OS X 10.6.4 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to properly handle serialized data. Successful exploitation could allow attackers to obtain sensitive information.

oval:org.secpod.oval:def:3746
The host is installed with Apple Mac OS X 10.6.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a userspace interruption of an internal function or handler. Successful exploitation could allow attackers to obtain sensitive info ...

oval:org.secpod.oval:def:3743
The host is installed with Apple Mac OS X 10.6.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle directory pathnames that lack a trailing / (slash) character. Successful exploitation could man-in-the-middle attackers to bypass int ...

oval:org.secpod.oval:def:3744
The host is installed with Apple Mac OS X 10.6 through 10.6.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a missing methodName element in the first argument to the xmlrpc_decode_request function. Successful exploitation coul ...

oval:org.secpod.oval:def:3747
The host is installed with Apple Mac OS X 10.5.8 or 10.6.4 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted field in a packet. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3830
The host is installed with Apple Mac OS X before 10.6.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly validate hostnames of SSH clients. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3831
The host is installed with Apple Mac OS X before 10.6.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle vectors related to use of wheel group membership during access to the home directories of user accounts. Successful explo ...

oval:org.secpod.oval:def:3837
The host is installed with Apple Mac OS X server before 10.5.8 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly handle symbolic links. Successful exploitation could allow local user with write access to a directory that is being deleted ma ...

oval:org.secpod.oval:def:3836
The host is installed with Apple Mac OS X server before 10.5.8 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly handle symbolic links. Successful exploitation could allow local user with write access to a directory that is being deleted ma ...

oval:org.secpod.oval:def:3828
The host is installed with Apple Mac OS X before 10.6.3 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted disk image with bzip2 compression. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3829
The host is installed with Apple Mac OS X before 10.6.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly perform authorization during processing of record names. Successful exploitation could allow local users to gain privileges.

oval:org.secpod.oval:def:3840
The host is installed with Apple Mac OS X 10.5.8 and is prone to cross site scripting vulnerability. A flaw is present in the application, which fails to handle a crafted byte sequence before a special character. Successful exploitation could allow attackers to inject arbitrary code.

oval:org.secpod.oval:def:3841
The host is installed with Apple Mac OS X 10.5.8 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle session data. Successful exploitation could allow attackers to inject arbitrary code.

oval:org.secpod.oval:def:3844
The host is installed with Apple Mac OS X before 10.6.3 and is prone to a stack based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted PostScript document. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3845
The host is installed with Apple Mac OS X before 10.6.3 and is prone to a nil credentials authentication bypass vulnerability. A flaw is present in the application, which fails to properly handle an invalid username without a password. Successful exploitation could allow attackers to bypass authenti ...

oval:org.secpod.oval:def:3842
The host is installed with Apple Mac OS X 10.6 before 10.6.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to prevent deletion of access restrictions of a Podcast Composer workflow when this workflow is overwritten. Successful exploitation could a ...

oval:org.secpod.oval:def:3843
The host is installed with Apple Mac OS X 10.6 before 10.6.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to support Login Window access control that is based solely on group membership. Successful exploitation could allow attackers to bypass int ...

oval:org.secpod.oval:def:3848
The host is installed with Apple Mac OS X before 10.6.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a string argument that represents a large number. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:3846
The host is installed with Apple Mac OS X before 10.6.3 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly validate non-printing ASCII characters. Successful exploitation could allow remote attackers to inject arbitrary web script or H ...

oval:org.secpod.oval:def:3839
The host is installed with Apple Mac OS X and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted document. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3812
The host is installed with Apple Mac OS X before 10.6.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a mount request. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3815
The host is installed with Apple Mac OS X before 10.6.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly disable the filter rules associated with a deleted mail account. Successful exploitation could allow attackers to have unspecified impac ...

oval:org.secpod.oval:def:3816
The host is installed with Apple Mac OS X before 10.6.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly enforce the key usage extension during processing of a keychain that specifies multiple certificates for an e-mail recipient. ...

oval:org.secpod.oval:def:3813
The host is installed with Apple Mac OS X before 10.6.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted PEF image. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3814
The host is installed with Apple Mac OS X before 10.6.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle floating point binary to text conversion. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3820
The host is installed with Apple Mac OS X before 10.6.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle vectors related to the embedding of these commands in the Authorization HTTP header. Successful exploitation could allow attac ...

oval:org.secpod.oval:def:3821
The host is installed with Apple Mac OS X before 10.6.3 and is prone to a directory traversal vulnerability. A flaw is present in the application, which allow attackers to share root's parent directory, and read and modify files in that directory. Successful exploitation could allow attackers to obt ...

oval:org.secpod.oval:def:3827
The host is installed with Apple Mac OS X before 10.6.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted disk image with bzip2 compression. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3824
The host is installed with Apple Mac OS X 10.5.8 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted NEF image. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3819
The host is installed with Apple Mac OS X before 10.6.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a file that contains crafted localization data with format string specifiers. Successful exploitation could allow a local ...

oval:org.secpod.oval:def:3817
The host is installed with Apple Mac OS X before 10.6.3 and is prone to a man-in-the-middle attack vulnerability. A flaw is present in the application, which fails to properly handle NULL characters in the subject's Common Name (CN) field of X.509 certificates. Successful exploitation could allow at ...

oval:org.secpod.oval:def:3818
The host is installed with Apple Mac OS X before 10.6.3 and is prone to a incomplete blacklist vulnerability. A flaw is present in the application, which fails to properly handle a web page that offers a download with a Content-Type value that is not on the list of possibly unsafe content types for ...

oval:org.secpod.oval:def:38498
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle input validation. Successful exploitation could allow local user to cause system denial of servic ...

oval:org.secpod.oval:def:38499
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle access restrictions. Successful exploitation could allow local attacker to modify downloaded mobil ...

oval:org.secpod.oval:def:38490
The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to execute ar ...

oval:org.secpod.oval:def:38491
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle apache_mod_php. Successful exploitation could allow attackers to cause an unexpected application ...

oval:org.secpod.oval:def:38500
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted file. Successful exploitation could allow attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:38501
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted file. Successful exploitation could allow attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:38560
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to gain root privileges.

oval:org.secpod.oval:def:38553
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to cause a denial of service.

oval:org.secpod.oval:def:38554
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers may gain access to privileged appli ...

oval:org.secpod.oval:def:38556
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to gain root privileges.

oval:org.secpod.oval:def:38557
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to exploit weaknesses in the 3DES cryptographi ...

oval:org.secpod.oval:def:38558
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to cause a denial of service.

oval:org.secpod.oval:def:38559
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow certificates may be unexpectedly evaluated as trusted.

oval:org.secpod.oval:def:38550
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code in the ...

oval:org.secpod.oval:def:38551
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to cause a denial of service.

oval:org.secpod.oval:def:38549
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code with ke ...

oval:org.secpod.oval:def:38541
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to determine kernel memory layout.

oval:org.secpod.oval:def:38542
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code with ke ...

oval:org.secpod.oval:def:38543
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code with ke ...

oval:org.secpod.oval:def:38544
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to read kernel memory.

oval:org.secpod.oval:def:38545
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to cause system denial of service.

oval:org.secpod.oval:def:38546
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to cause an unexpected system ter ...

oval:org.secpod.oval:def:38547
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to gain root privileges.

oval:org.secpod.oval:def:38548
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code with ke ...

oval:org.secpod.oval:def:38540
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to read kernel memory.

oval:org.secpod.oval:def:38538
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code with ke ...

oval:org.secpod.oval:def:38539
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to determine kernel memory layout.

oval:org.secpod.oval:def:38530
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted .gcx. Successful exploitation could allow attackers to lead to unexpected ap ...

oval:org.secpod.oval:def:38531
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted .gcx. Successful exploitation could allow attackers to lead to unexpected ap ...

oval:org.secpod.oval:def:38532
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitr ...

oval:org.secpod.oval:def:38533
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to lead to memory leak.

oval:org.secpod.oval:def:38534
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to lead to execute arbitrary code ...

oval:org.secpod.oval:def:38535
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to lead to determine kernel memory layout.

oval:org.secpod.oval:def:38536
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to read kernel memory.

oval:org.secpod.oval:def:38527
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code with ke ...

oval:org.secpod.oval:def:38528
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted font file. Successful exploitation could allow attackers to execute arbitrar ...

oval:org.secpod.oval:def:38529
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted font file. Successful exploitation could allow attackers to execute arbitrar ...

oval:org.secpod.oval:def:38794
The host is installed with Apple Mac OS X or Server 10.12.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to execute arbitrary code with kernel privilege ...

oval:org.secpod.oval:def:38795
The host is installed with Apple Mac OS X or Server 10.12.2 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly perform URL validation. Successful exploitation could allow attackers to execute arbitrary code with kernel privileges.

oval:org.secpod.oval:def:38796
The host is installed with Apple Mac OS X or Server 10.12.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly perform memory management. Successful exploitation could allow attackers to determine kernel memory layout.

oval:org.secpod.oval:def:38797
The host is installed with Apple Mac OS X or Server 10.12.2 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly perform memory handling. Successful exploitation could allow attackers to execute arbitrary code with kernel privileges.

oval:org.secpod.oval:def:38798
The host is installed with Apple Mac OS X or Server 10.12.2 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly perform memory management. Successful exploitation could allow attackers to execute arbitrary code with kernel privileges.

oval:org.secpod.oval:def:38799
The host is installed with Apple Mac OS X or Server 10.12.2 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly perform memory management. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:38790
The host is installed with Apple Mac OS X or Server 10.12.2 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle an integer underflow in a calculation. Successful exploitation may cause an unexpected application termination ...

oval:org.secpod.oval:def:38793
The host is installed with Apple Mac OS X or Server 10.12.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation could allow attackers to execute arbitrary code with kernel privileges.

oval:org.secpod.oval:def:3891
The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a memory corruption vulnerability. The flaw is present in the application, which fails to properly perform OpenGL Shading Language (aka GLSL) compilation. Successful exploitation could allow attackers to execute ...

oval:org.secpod.oval:def:3890
The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a memory corruption vulnerability. The flaw is present in the application, which fails to handle a crafted MP4 file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

oval:org.secpod.oval:def:3895
The host is installed with Apple Mac OS X 10.7.x before 10.7.3 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to properly handle a crafted embedded font in a document. Successful exploitation could allow attackers to execute arbitrary code or cause ...

oval:org.secpod.oval:def:3896
The host is installed with Apple Mac OS X 10.7.x before 10.7.3 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted movie file with H.264 encoding. Successful exploitation could allow attackers to execute arbitrary ...

oval:org.secpod.oval:def:3893
The host is installed with Apple Mac OS X 10.7.x before 10.7.3 and is prone to an information disclosure vulnerability. The flaw is present in the application, which fails to preserve the Wi-Fi configuration across software updates. Successful exploitation could allow attackers to obtain sensitive i ...

oval:org.secpod.oval:def:3894
The host is installed with Apple Mac OS X 10.7.x before 10.7.3 and is prone to a memory corruption vulnerability. The flaw is present in the application, which fails to properly restrict the allocation of stack memory. Successful exploitation could allow attackers to execute arbitrary code or cause ...

oval:org.secpod.oval:def:3899
The host is installed with Apple Mac OS X 10.7.x before 10.7.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which returns incorrect results for a maliciously crafted hostname. Successful exploitation could allow attackers to disclose sensitive inform ...

oval:org.secpod.oval:def:3897
The host is installed with Apple Mac OS X 10.7.x before 10.7.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly construct request headers during parsing of URLs. Successful exploitation could allow attackers to obtain sensitive in ...

oval:org.secpod.oval:def:3898
The host is installed with Apple Mac OS X 10.7.x before 10.7.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which automatically switches it to unencrypted sessions upon failure of encrypted connections. Successful exploitation could allow attackers t ...

oval:org.secpod.oval:def:3870
The host is installed with Apple Mac OS X 10.6 before 10.6.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly resolve pathnames in certain circumstances involving an application's save panel. Successful exploitation could allow attac ...

oval:org.secpod.oval:def:3871
The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle the dir and prefix arguments. Successful exploitation could allow context-dependent attackers to bypass safe_mo ...

oval:org.secpod.oval:def:3872
The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly recognize the safe_mode_include_dir directive. Successful exploitation could allow attackers bypass open_basedir restr ...

oval:org.secpod.oval:def:38801
The host is installed with Apple Mac OS X or Server 10.12.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly block malicious popups. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:3877
The host is installed with Apple Mac OS X 10.6 before 10.6.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails properly perform access control checks. Successful exploitation could allow remote authenticated users to bypass intended access restri ...

oval:org.secpod.oval:def:3878
The host is installed with Apple Mac OS X 10.5.8 and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to handle strings that are used as input to the sasl_encode64 function in lib/saslutil.c. Successful exploitation could allow attackers to ...

oval:org.secpod.oval:def:3876
The host is installed with Apple Mac OS X 10.6 before 10.6.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails ensure that copied files are owned by the user performing the copy. Successful exploitation could allow local users to bypass intended disk- ...

oval:org.secpod.oval:def:3880
The host is installed with Apple Mac OS X 10.5.8 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a redirect. Successful exploitation could allow attackers to access local files

oval:org.secpod.oval:def:3881
The host is installed with Apple Mac OS X 10.5.8 and is prone to an improper virus update vulnerability. A flaw is present in the application if Security Update 2009-005 is applied, which has an incorrect launchd.plist ProgramArguments key and consequently does not run. Successful exploitation coul ...

oval:org.secpod.oval:def:3882
The host is installed with Apple Mac OS X 10.5.8 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a packet data. Successful exploitation could allow attackers to bypass intended access restrictions.

oval:org.secpod.oval:def:3883
The host is installed with Apple Mac OS X 10.4.11 or 10.5.8 and is prone to a denial of service vulnerability. A flaw is present in the dns_db_findrdataset function in db.c, which fails to handle maliciously crafted update message. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3888
The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a buffer overflow vulnerability. The flaw is present in the application, which fails to handle a crafted PNG file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

oval:org.secpod.oval:def:3889
The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to an Off-by-one buffer overflow vulnerability. The flaw is present in the application, which fails to handle a crafted rdrf atom in a movie file. Successful exploitation could allow attackers to execute arbitrary ...

oval:org.secpod.oval:def:3887
The host is installed with Apple Mac OS X 10.7.x before 10.7.3 and is prone to an information disclosure vulnerability. The flaw is present in the application, which fails to verify the unique identifier of its remote AFP volume or Time Capsule. Successful exploitation could allow attackers to obtai ...

oval:org.secpod.oval:def:3851
The host is installed with Apple Mac OS X before 10.6.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an unanticipated oplock break notification reply packet. Successful exploitation could allow remote attackers to crash the s ...

oval:org.secpod.oval:def:3862
The host is installed with Apple Mac OS X 10.5.5 or 105.8 and is prone to an arbitrary shell command execution vulnerability. A flaw is present in the application, which fails to properly handle escape characters. Successful exploitation could allow attackers to execute arbitrary shell commands.

oval:org.secpod.oval:def:3863
The host is installed with Apple Mac OS X 10.5.5 or 10.5.8 and is prone to untrusted search path vulnerability. A flaw is present in the application, which fails to properly handle a Trojan horse Python file in the current working directory. Successful exploitation could allow attackers to execute a ...

oval:org.secpod.oval:def:3860
The host is installed with Apple Mac OS X 10.5.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a macro invocation through invalid buffer. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3861
The host is installed with Apple Mac OS X 10.5.5 or 10.5.8 and is prone to a arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly sanitize inputs before invoking the execute or system functional. Successful exploitation could allow attackers to execut ...

oval:org.secpod.oval:def:3866
The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to parse 1-bit interlaced images with width values that are not divisible by 8. Successful exploitation could allow attack ...

oval:org.secpod.oval:def:3865
The host is installed with Apple Mac OS X 10.6 before 10.6.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to enforce the service access control list (SACL) for weblogs during weblog creation. Successful exploitation could allow remote authenticat ...

oval:org.secpod.oval:def:3931
The host is missing a critical security update according to Apple advisory, APPLE-SA-2012-02-03-1. The update is required to fix multiple vulnerabilities. The flaws are present in the applications which fail to sanitize user supplied input. Successful exploitation could allow attackers to execute ar ...

oval:org.secpod.oval:def:3929
The host is installed with Apple Mac OS X 10.6.8 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a modified POP3 port number. Successful exploitation could allow remote authenticated users to bypass firewall restrictions.

oval:org.secpod.oval:def:3927
The host is installed with Apple Mac OS X 10.6.8 and is prone to a click-jacking attack vulnerability. A flaw is present in the application, which fails to prevent page rendering inside a frame in a third-party HTML document. Successful exploitation could allow attackers to inject arbitrary code.

oval:org.secpod.oval:def:3928
The host is installed with Apple Mac OS X 10.6.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle properly handle 8-bit characters in passwords. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:38520
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to curl. Successful exploitation could allow attackers to leak sensitive u ...

oval:org.secpod.oval:def:38521
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to curl. Successful exploitation could allow attackers to leak sensitive u ...

oval:org.secpod.oval:def:38522
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to curl. Successful exploitation could allow attackers to leak sensitive u ...

oval:org.secpod.oval:def:38523
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to curl. Successful exploitation could allow attackers to leak sensitive u ...

oval:org.secpod.oval:def:38524
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to curl. Successful exploitation could allow attackers to leak sensitive u ...

oval:org.secpod.oval:def:38525
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to curl. Successful exploitation could allow attackers to leak sensitive u ...

oval:org.secpod.oval:def:38526
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to gain root privileges.

oval:org.secpod.oval:def:3910
The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which returns the value of the salt argument instead of the hashed string. Successful exploitation could allow attackers to bypass authentic ...

oval:org.secpod.oval:def:3911
The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly check the return values of the malloc, calloc, and realloc library functions. Successful exploitation could ...

oval:org.secpod.oval:def:3914
The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle passwords with 8-bit characters. Successful exploitation could allow attackers to obtain sensitive in ...

oval:org.secpod.oval:def:3912
The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly check web script or HTML injected to the the _mbox parameter. Successful exploitation could allow attackers to ...

oval:org.secpod.oval:def:3913
The host is installed with Apple Mac OS X 10.6.8, 10.7.x before 10.7.3, 10.9.5, 10.10.5 or 10.11.x before 10.11.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted LZW stream and a crafted compressed stream. Successful e ...

oval:org.secpod.oval:def:3907
The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a memory corruption vulnerability. The flaw is present in the application, which fails to properly handle crafted JPEG2000 image file. Successful exploitation could allow attackers to execute arbitrary code or c ...

oval:org.secpod.oval:def:3908
The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle FLC encoded movie files. Successful exploitation could allow attackers to execute arbitrary code or crash the ...

oval:org.secpod.oval:def:3905
The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a denial of service vulnerability. The flaw is present in the application, which fails to properly handle a crafted font. Successful exploitation could allow attackers to execute arbitrary code or crash the serv ...

oval:org.secpod.oval:def:3906
The host is installed with Apple Mac OS X 10.6.8 and is prone to a buffer overflow vulnerability. The flaw is present in the application, which fails to properly handle maliciously crafted audio content. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

oval:org.secpod.oval:def:3909
The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to an integer signedness error vulnerability. A flaw is present in the application, which fails to properly handle a crafted font table in a QuickTime movie file. Successful exploitation could allow attackers to ex ...

oval:org.secpod.oval:def:38516
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to curl. Successful exploitation could allow attackers to leak sensitive u ...

oval:org.secpod.oval:def:38517
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to curl. Successful exploitation could allow attackers to leak sensitive u ...

oval:org.secpod.oval:def:38518
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to curl. Successful exploitation could allow attackers to leak sensitive u ...

oval:org.secpod.oval:def:38519
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to curl. Successful exploitation could allow attackers to leak sensitive u ...

oval:org.secpod.oval:def:38512
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to curl. Successful exploitation could allow attackers to leak sensitive u ...

oval:org.secpod.oval:def:38515
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to curl. Successful exploitation could allow attackers to leak sensitive u ...

oval:org.secpod.oval:def:3921
The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3922
The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a request for a baselined WebDAV resource. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3920
The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a replay REPORT operation. Successful exploitation could allow attackers to obtain sensitive information.

oval:org.secpod.oval:def:3925
The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a use-after-free vulnerability. A flaw is present in the application, which uses the same variable for multiple arguments. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3926
The host is installed with Apple Mac OS X 10.6.8 and is prone to a multiple cross site scripting vulnerabilities. The flaws are present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to inject arbitrary web script or HTML.

oval:org.secpod.oval:def:3923
The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle certain flags arguments. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3924
The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the application, which fails to handle crafted THUNDER_2BITDELTAS data in a .tiff file that has an unexpected BitsPerSample value. Successful expl ...

oval:org.secpod.oval:def:3918
The host is installed with Apple Mac OS X 10.6.8 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle a crafted STYLE element in an e-mail message. Successful exploitation could allow attackers to inject arbitrary web script or HTML.

oval:org.secpod.oval:def:3919
The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a long pathname for a UNIX socket. Successful exploitation could allow attackers to execute arbitrary code ...

oval:org.secpod.oval:def:3916
The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly restrict filenames in multipart/form-data POST requests. Successful exploitation could allow attackers to conduct ab ...

oval:org.secpod.oval:def:38505
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle malicious strings. Successful exploitation could allow attackers to lead to an unexpected applic ...

oval:org.secpod.oval:def:38506
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted font. Successful exploitation could allow attackers to lead to unexpected applicatio ...

oval:org.secpod.oval:def:38507
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted .mp4. Successful exploitation could allow attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:38508
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle input validation. Successful exploitation could allow attackers to cause system denial of service.

oval:org.secpod.oval:def:38509
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted font file. Successful exploitation could allow attackers to lead to arbitrar ...

oval:org.secpod.oval:def:38502
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle input validations. Successful exploitation could allow attackers to cause denial of service.

oval:org.secpod.oval:def:38503
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle memory handling. Successful exploitation could allow attackers to execute arbitrary code with sy ...

oval:org.secpod.oval:def:38504
The host is installed with Apple Mac OS X or Server 10.11.6 or 10.12.x through 10.12.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle state management. Successful exploitation could allow attackers to cause system denial of ser ...

oval:org.secpod.oval:def:3900
The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a certificate spoofing vulnerability. The flaw is present in the application, which fails to properly handle an untrusted attribute of a certification authority certificate. Successful exploitation could allow a ...

oval:org.secpod.oval:def:3903
The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a buffer overflow vulnerability. The flaw is present in the application, which fails to properly handle a long salt argument. Successful exploitation could allow attackers to produce unspecified impacts.

oval:org.secpod.oval:def:3904
The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a denial of service vulnerability. The flaw is present in the application, which fails to properly implement the error_log function. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3902
The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a denial of service vulnerability. The flaw is present in the application, which fails to properly handle a malformed PNG image. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:39610
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly validate input. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39611
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted .dfont file. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39612
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an infinite recursion. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:39613
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted .mov file. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39614
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted font file. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39615
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to disclose process memory.

oval:org.secpod.oval:def:39605
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation could allow attackers to execute arbitrary code with kernel privileges.

oval:org.secpod.oval:def:39606
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly validate input. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39607
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly validate input. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39608
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly validate input. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39609
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly validate input. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39604
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39652
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly perform memory handling. Successful exploitation could allow attackers to execute arbitrary code with system privileges.

oval:org.secpod.oval:def:39654
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow local users to gain privileges.

oval:org.secpod.oval:def:39650
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a man-in-the-middle attack vulnerability. A flaw is present in the application, which fails to properly perform cleanup. Successful exploitation could allow attackers to bypass certificate pinning.

oval:org.secpod.oval:def:39651
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to disclose process memory.

oval:org.secpod.oval:def:39649
The host is installed with Apple Mac OS X or Server 10.12.3 or 10.11.6 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly perform constant time computation. Successful exploitation could allow attackers to leak sensitive user inform ...

oval:org.secpod.oval:def:39641
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39642
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an off-by-one vulnerability. A flaw is present in the application, which fails to properly perform bounds checking. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39643
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39644
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly perform memory handling. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39645
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly perform memory handling. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39646
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly perform bounds checking. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39647
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation could allow a local attacker to change file system.

oval:org.secpod.oval:def:39648
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly perform memory management. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39640
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly perform memory management. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39638
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39639
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39630
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted image. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:39631
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted image. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39632
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted image. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39633
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted image. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39634
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:39635
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39636
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39637
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39627
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39628
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39620
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39621
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39622
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39623
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an out-of-bounds read vulnerability. The flaws are present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39624
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle malicious HTTP/2 server. Successful exploitation could allow attackers to cause undefined behavior.

oval:org.secpod.oval:def:39625
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly perform state management. Successful exploitation could allow attackers to unexpectedly leak the CR8 control register bet ...

oval:org.secpod.oval:def:39626
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly perform URL handling. Successful exploitation could allow attackers to disclose local files.

oval:org.secpod.oval:def:39616
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to lead to resource exhaustion.

oval:org.secpod.oval:def:39618
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle DMA. Successful exploitation could allow attackers to recover the FileVault 2 encryption password.

oval:org.secpod.oval:def:39619
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a permission handling vulnerability. A flaw is present in the application, which fails to properly handle improper permission controls. Successful exploitation could allow attackers to reset permissions when sending links.

oval:org.secpod.oval:def:39593
The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted JPEG file. Successful exploitation could allow attackers to execute arbitrary code ...

oval:org.secpod.oval:def:40594
The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:40597
The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to read restricted memory.

oval:org.secpod.oval:def:40598
The host is installed with Apple Mac OS X or Server 10.12.4 or 10.11.6 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly handle filesystem restrictions. Successful exploitation could allow attackers togain system privileges.

oval:org.secpod.oval:def:40595
The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly perform certificate validation. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:40596
The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to gain system privileges.

oval:org.secpod.oval:def:40599
The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly perform input sanitization. Successful exploitation could allow attackers to read restricted memory.

oval:org.secpod.oval:def:39657
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39659
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted media file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

oval:org.secpod.oval:def:40601
The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly perform path validation. Successful exploitation could allow attackers to execute arbitrary code with root privileges.

oval:org.secpod.oval:def:40602
The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation could allow attackers to escape its sandbox.

oval:org.secpod.oval:def:40600
The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted book. Successful exploitation could allow attackers open arbitrary websites without user permissi ...

oval:org.secpod.oval:def:40605
The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly perform input sanitization. Successful exploitation could allow attackers to read restricted memory.

oval:org.secpod.oval:def:40606
The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation could allow attackers to gain kernel privileges.

oval:org.secpod.oval:def:40603
The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to gain kernel privileges.

oval:org.secpod.oval:def:40604
The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to gain kernel privileges.

oval:org.secpod.oval:def:40609
The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly perform input sanitization. Successful exploitation could allow attackers to read restricted memory.

oval:org.secpod.oval:def:40607
The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly perform locking. Successful exploitation could allow attackers to execute arbitrary code with kernel privileges.

oval:org.secpod.oval:def:40608
The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly perform input sanitization. Successful exploitation could allow attackers to read restricted memory.

oval:org.secpod.oval:def:40612
The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly perform input sanitization. Successful exploitation could allow attackers to read restricted memory.

oval:org.secpod.oval:def:40613
The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation could allow attackers to gain kernel privileges.

oval:org.secpod.oval:def:40610
The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly perform input sanitization. Successful exploitation could allow attackers to read restricted memory.

oval:org.secpod.oval:def:40611
The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly perform input sanitization. Successful exploitation could allow attackers to read restricted memory.

oval:org.secpod.oval:def:40616
The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to make an application to escape sandbox ...

oval:org.secpod.oval:def:40614
The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation could allow attackers to gain kernel privileges.

oval:org.secpod.oval:def:40615
The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation could allow attackers to gain kernel privileges.

oval:org.secpod.oval:def:39663
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle input validation. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39664
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a double free vulnerability. A flaw is present in the application, which fails to properly perform memory management. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39665
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly perform permissions checking. Successful exploitation could allow attackers to unexpectedly escalate privileges using sudo.

oval:org.secpod.oval:def:39666
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly perform validation during the installation process. Successful exploitation could allow attackers to modify protected disk l ...

oval:org.secpod.oval:def:39660
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle cryptographic API calls. Successful exploitation could allow attackers to validate empty signatures.

oval:org.secpod.oval:def:39661
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly validate the authenticity of OTR packets. Successful exploitation could allow attackers to capture or modify data in session ...

oval:org.secpod.oval:def:39662
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle bounds checking. Successful exploitation could allow attackers to execute arbitrary code with root privileges.

oval:org.secpod.oval:def:39715
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an address bar spoofing vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39716
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39717
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39712
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39713
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:40617
The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12.4 and is prone to a resource exhaustion vulnerability. A flaw is present in the application, which fails to properly handle crafted input. Successful exploitation could allow attackers to make an application to escape sand ...

oval:org.secpod.oval:def:40618
The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an access issue. Successful exploitation could allow attackers to make an application to escape sandbox restrictions.

oval:org.secpod.oval:def:40619
The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation could allow attackers to make an application to escape sandbox restrictions.

oval:org.secpod.oval:def:40620
The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted SQL query. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:40623
The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted SQL query. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:40624
The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle crafted SQL query. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:40621
The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted SQL query. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:40622
The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted SQL query. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:40627
The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:40628
The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:40625
The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle crafted SQL query. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:40626
The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:40629
The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:40630
The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly perform input sanitization. Successful exploitation could allow attackers to read restricted memory.

oval:org.secpod.oval:def:40631
The host is missing a security update according to Apple advisory, APPLE-SA-2017-05-15-3. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary ...

oval:org.secpod.oval:def:42259
The host is missing a security update according to Apple advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle malicious vectors. Successful exploitation could allow attackers to bypass and disclose information.

oval:org.secpod.oval:def:42258
The host is installed with Apple Mac OS X or Server 10.13 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a malicious application. Successful exploitation could allow attackers to bypass the keychain access prompt with a synthetic ...

oval:org.secpod.oval:def:42257
The host is installed with Apple Mac OS X or Server 10.13 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle when hint was set in Disk Utility while creating an APFS encrypted volume, the password will be stored as the hint. ...

oval:org.secpod.oval:def:4280
The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to a cross-site request forgery vulnerability. A flaw is present in the application, which fails to handle requests that change settings. Successful exploitation could allow attackers to hijack the authentication of ...

oval:org.secpod.oval:def:4278
The host is installed with Apple Mac OS X 10.5.8 or 10.6.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle maliciously crafted embedded font. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:4279
The host is missing a security update according to Apple advisory, APPLE-SA-2010-04-14-1. The update is required to fix an unspecified vulnerability. A flaw is present in the application, which fails to handle maliciously crafted embedded font. Successful exploitation could allow attackers to execut ...

oval:org.secpod.oval:def:4647
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors involving nested Standard Encoding Accented Character (aka seac) calls. Successful exploitation could allow remote at ...

oval:org.secpod.oval:def:4648
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted BDF font file. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:4649
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted IPP request. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:4654
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted font file. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:4652
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted font file. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:4653
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle negative size values. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:4626
The host is installed with Apple Mac OS X 10.6 before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted xar archive. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:4624
The host is installed with Apple Mac OS X 10.5.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted embedded Compact Font Format (CFF) font in a document. Successful exploitation could allow attackers to execute arbitrary ...

oval:org.secpod.oval:def:4629
The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle XML data. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:4628
The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a maliciously crafted "feed:" URL. Successful exploitation could allow remote attackers to obtain sensitive info ...

oval:org.secpod.oval:def:4287
The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to multiple integer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted TIFF file. Successful exploitation could allow attackers to trigger a heap-based buffer overflow.

oval:org.secpod.oval:def:4288
The host is installed with Apple Mac OS X 10.5.8 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted movie file with MPEG2 encoding. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

oval:org.secpod.oval:def:4285
The host is installed with Apple Mac OS X 10.6 before 10.6.4 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle via a crafted help: URL. Successful exploitation could allow attackers to inject arbitrary web script or HTML.

oval:org.secpod.oval:def:4286
The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to handle directory traversal sequences in an inline image-transfer operation. Successful exploitation could allow attackers t ...

oval:org.secpod.oval:def:4283
The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to set the expected file ownerships. Successful exploitation allows local users to bypass intended access restrictions.

oval:org.secpod.oval:def:4284
The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to a arbitrary file deletion vulnerability. A flaw is present in the application, which fails to handle a symlink attack in conjunction with an unmount operation on a crafted volume. Successful exploitation allows lo ...

oval:org.secpod.oval:def:4281
The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to handle a client disconnection during listing of a large number of print jobs. Successful exploitation could allow attackers to c ...

oval:org.secpod.oval:def:4282
The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle parameter values containing a % (percent) character without two subsequent hex characters. Successful exploitati ...

oval:org.secpod.oval:def:4298
The host is installed with Apple Mac OS X 10.6 before 10.6.4 and is prone to a cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to handle a crafted URI that triggers a UTF-7 error page. Successful exploitation could allow remote attackers to inject arbitrar ...

oval:org.secpod.oval:def:4299
The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to a cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to handle vectors involving symbolic links. Successful exploitation could allows remote authenticated users to access a ...

oval:org.secpod.oval:def:4296
The host is installed with Apple Mac OS X 10.6 before 10.6.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly interpret character encoding. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:4297
The host is installed with Apple Mac OS X 10.6 before 10.6.4 and is prone to a integer overflow vulnerability. A flaw is present in the application, which fails to handle vectors related to page sizes. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:4290
The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to multiple integer overflow vulnerability. A flaw is present in the application, which fails to handle ciphertext with a length that is too short to be valid. Successful exploitation could allow attackers to execute ...

oval:org.secpod.oval:def:4294
The host is installed with Apple Mac OS X 10.6 before 10.6.4 and is prone to multiple format string vulnerabilities. The flaws are present in the application, which fails to handle format string specifiers in a (1) afp, (2) cifs, or (3) smb URL. Successful exploitation could allow attackers to crash ...

oval:org.secpod.oval:def:4295
The host is installed with Apple Mac OS X 10.6 before 10.6.4 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle certain SSL failures. Successful exploitation could allow attackers to spoof arbitrary network account servers, and poss ...

oval:org.secpod.oval:def:4293
The host is installed with Apple Mac OS X 10.5.8 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to provide expected authorization requirements. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:4320
The host is installed with Apple Mac OS 10.5.8 or 10.6.0 before 10.6.4 and is prone to multiple integer overflow vulnerabilities. The flaws are present in the application, which fails to handle a crafted TIFF file. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:4300
The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to multiple cross-site scripting (XSS) vulnerabilities. The flaws are present in the application, which fails to handle vectors involving (1) certain encrypted strings in e-mail headers, related to contrib/decrypt_he ...

oval:org.secpod.oval:def:4304
The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle crafted Wiki content. Successful exploitation allows remote attackers to inject arbitrary web script or HTML .

oval:org.secpod.oval:def:4308
The host is installed with Apple Quicktime before 7.6.9 and Apple Mac OS X 10.6 before 10.6.5 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted jp2 image. Successful exploitation could allow attackers to execute arbitrar ...

oval:org.secpod.oval:def:4309
The host is installed with Apple Quicktime before 7.6.9 and Apple Mac OS X 10.6 before 10.6.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted jp2 file. Successful exploitation could allow attackers to execute arbitrary code or ...

oval:org.secpod.oval:def:4310
The host is installed with Apple Quicktime before 7.6.9 and Apple Mac OS X 10.6 before 10.6.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted AVI file. Successful exploitation could allow attackers to execute arbitrary code or ...

oval:org.secpod.oval:def:4313
The host is installed with Apple Quicktime before 7.6.9 and Apple Mac OS X 10.6 before 10.6.5 and is prone to a integer signedness error vulnerability. A flaw is present in the application, which fails to handle a crafted MPEG movie file. Successful exploitation could allow attackers to execute arbi ...

oval:org.secpod.oval:def:4314
The host is installed with Apple Quicktime before 7.6.9 and Apple Mac OS X 10.6 before 10.6.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted Sorenson movie file. Successful exploitation could allow attackers to execute arbitra ...

oval:org.secpod.oval:def:4311
The host is installed with Apple Quicktime before 7.6.9 and Apple Mac OS X 10.6 before 10.6.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted movie file. Successful exploitation could allow attackers to execute arbitrary code o ...

oval:org.secpod.oval:def:4312
The host is installed with Apple Quicktime before 7.6.9 and Apple Mac OS X 10.6 before 10.6.5 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted MPEG movie file. Successful exploitation could allow attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:4315
The host is installed with Apple Quicktime before 7.6.9 and Apple Mac OS X 10.6 before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted FlashPix file. Successful exploitation could allow attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:4316
The host is installed with Apple Quicktime before 7.6.9 and Apple Mac OS X 10.6 before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted GIF file. Successful exploitation could allow attackers to execute arbitrary code or ...

oval:org.secpod.oval:def:4319
The host is installed with Apple Mac OS X 10.4.11 or 10.5 before 10.5.8 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted image containing an embedded ColorSync profile. Successful exploitation could allow attackers to o ...

oval:org.secpod.oval:def:5794
The host is installed with Apple Mac OS X 10.7.x before 10.7.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle vectors involving a temporary files. Successful exploitation could allow attackers to gain privileges.

oval:org.secpod.oval:def:5793
The host is installed with Apple Mac OS X 10.7.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly restrict what is written to the system log for network logins. Successful exploitation could allow attackers to obtain sensitive inf ...

oval:org.secpod.oval:def:5797
The host is installed with Apple Mac OS X 10.6.8 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted message. Successful exploitation could allow an attacker to disclose memory from directory server's address space.

oval:org.secpod.oval:def:5842
The host is missing an important security update according to Apple advisory, APPLE-SA-2011-09-09-1. The update is required to fix an information disclosure vulnerability. A flaw is present in the application, which fails to handle fraudulent certificates. Successful exploitation could allow attacke ...

oval:org.secpod.oval:def:5810
The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted MPEG file. Successful exploitation could allow attackers to execute arbitrary code or crash the ser ...

oval:org.secpod.oval:def:5814
The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle Exception#to_s method. Successful exploitation could allow context-dependent attackers to modify strings.

oval:org.secpod.oval:def:5813
The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to a Symlink attack vulnerability. A flaw is present in the application, which fails to properly handle a symlink attack. Successful exploitation could allow attackers to delete arbitrary files.

oval:org.secpod.oval:def:5812
The host is installed with Apple Mac OS X 10.7.0 before 10.7.4 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to properly handle a crafted movie file with JPEG2000 encoding. Successful exploitation could allow attackers to execute arbitrary code or ...

oval:org.secpod.oval:def:5811
The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to a buffer underflow vulnerability. A flaw is present in the application, which fails to properly handle crafted MPEG file. Successful exploitation could allow attackers to execute arbitrary code or crash the serv ...

oval:org.secpod.oval:def:5818
The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted input. Successful exploitation could allow attackers to execute arbitrary code or crash the servi ...

oval:org.secpod.oval:def:5815
The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted input to an application that maintains a hash table. Successful exploitation could allow attacker ...

oval:org.secpod.oval:def:5809
The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted audio sample tables in a movie file. Successful exploitation could allow attackers to execute arbitra ...

oval:org.secpod.oval:def:5808
The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to an improper access control vulnerability. A flaw is present in the application, which fails to properly handle screen savers. Successful exploitation could allow attackers to bypass screen locking and launch a S ...

oval:org.secpod.oval:def:5819
The host is installed with Apple Mac OS X 10.7.0 before 10.7.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails does not require continued use of SRP-based authentication after this authentication method is first used. Successful exploitation could a ...

oval:org.secpod.oval:def:5803
The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted XML file. Successful exploitation could allow attackers to trigger a heap-based buffer overflow w ...

oval:org.secpod.oval:def:5802
The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to a network sniffing attack vulnerability. A flaw is present in the application, which fails to properly restrict the length of RSA keys within X.509 certificates. Successful exploitation could allow attackers to ...

oval:org.secpod.oval:def:5801
The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to an uninitialized memory access vulnerability. A flaw is present in the application, which fails to properly handle X.509 certificates. Successful exploitation could allow attackers to execute arbitrary code or c ...

oval:org.secpod.oval:def:5805
The host is installed with Apple Mac OS X 10.7.0 before 10.7.4 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted offset_val value in an EXIF header in a JPEG file. Successful exploitation could allow attackers to read th ...

oval:org.secpod.oval:def:5804
The host is installed with Apple Mac OS X 10.7.0 before 10.7.4 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly handle an empty password. Successful exploitation allows physically proximate attackers to login to arbitrary accounts.

oval:org.secpod.oval:def:4688
The host is installed with Apple Mac OS X 10.6 before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a memory management issue. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:4689
The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.5 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted RAW image. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:4694
The host is installed with Apple Mac OS X 10.5.8 or 10.6.x before 10.6.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a bidirectional text string with ellipsis truncation. Successful exploitation could allow remote attackers to crash ...

oval:org.secpod.oval:def:4695
The host is installed with Apple Mac OS X 10.5.8 or 10.6.x before 10.6.5 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle the password-validation functionality in Directory Services. Successful exploitation could allow ...

oval:org.secpod.oval:def:4692
The host is installed with Apple Mac OS X 10.6.2 before 10.6.5 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle a crafted image. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:4693
The host is installed with Apple Mac OS X 10.6.x before 10.6.5 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a bidirectional text string with ellipsis truncation. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:4698
The host is installed with Apple Mac OS X 10.5.8 or 10.6.x before 10.6.5 and is prone to a stack based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted PDF document. Successful exploitation could allow remote attackers to execute arbitrary ...

oval:org.secpod.oval:def:4699
The host is installed with Apple Mac OS X 10.6.x before 10.6.5 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted website. Successful exploitation could allow remote attackers to set cookies for a partial IP add ...

oval:org.secpod.oval:def:4696
The host is installed with Apple Mac OS X 10.5.8 or 10.6.x before 10.6.5 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle errors associated with disabled mobile accounts. Successful exploitation could allow remote attac ...

oval:org.secpod.oval:def:4697
The host is installed with Apple Mac OS X 10.5.8 or 10.6.x before 10.6.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font in a PDF document. Successful exploitation could allow remote attackers to execute arbitrary ...

oval:org.secpod.oval:def:4690
The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted PSD image. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:4691
The host is installed with Apple Mac OS X 10.6 before 10.6.5 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle a crafted image. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:4720
The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.5 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a large ZSIZE value in a black-and-white (aka B/W) RGB image. Successful exploitation could allow remote attackers to cr ...

oval:org.secpod.oval:def:4724
The host is installed with Apple Mac OS X 10.6 before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the applications, which fail to properly handle a crafted XML document. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:4725
The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the applications, which fail to properly handle vectors related to large values in certain inputs. Successful exploitation could allow attackers to execute a ...

oval:org.secpod.oval:def:4722
The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the applications, which fail to properly handle a crafted archive. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:4723
The host is installed with Apple Mac OS X 10.6 before 10.6.5 and is prone to a security bypass vulnerability. A flaw is present in the applications, which fail to properly handle a crafted certificate. Successful exploitation could allow attackers to spoof arbitrary SSL servers.

oval:org.secpod.oval:def:4726
The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.5 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly handle a crafted URI. Successful exploitation could allow attackers to inject arbitrary web script or HTML.

oval:org.secpod.oval:def:4719
The host is installed with Apple Mac OS X 10.6 before 10.6.5 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted archive that uses LZW compression. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:4700
The host is installed with Apple Mac OS X 10.6.x before 10.6.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted embedded font in a document. Successful exploitation could allow remote attackers to execute arbitrary code ...

oval:org.secpod.oval:def:4707
The host is installed with Apple Mac OS X 10.6.x before 10.6.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to verify the unique identifier of its remote AFP volume. Successful exploitation could allow remote attackers to obtain sensitive ...

oval:org.secpod.oval:def:4710
The host is installed with Apple Mac OS X 10.5.8 or 10.6.x before 10.6.5 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to handle a large image. Successful exploitation could allow remote attackers to execute arbitrary code or crash the service.

oval:org.secpod.oval:def:4713
The host is installed with Apple Mac OS X 10.6.x before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle certain situations in which a client sends no request body. Successful exploitation could allow remote attackers to c ...

oval:org.secpod.oval:def:4714
The host is installed with Apple Mac OS X 10.6.x before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a modrdn call with a zero-length RDN destination string. Successful exploitation could allow remote attackers to cras ...

oval:org.secpod.oval:def:4711
The host is installed with Apple Mac OS X 10.6.x before 10.6.5 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to handle an arbitrary certificate issued by a legitimate Certification Authority. Successful exploitation could allow remote attackers to b ...

oval:org.secpod.oval:def:4712
The host is installed with Apple Mac OS X 10.6.x before 10.6.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle headers in subrequests in certain circumstances involving a parent request that has a body. Successful exploitation coul ...

oval:org.secpod.oval:def:4717
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted PNG file. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:4718
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted application. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:4715
The host is installed with Apple Mac OS X 10.6.x before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a modrdn call with an RDN string containing invalid UTF-8 sequences. Successful exploitation could allow remote attac ...

oval:org.secpod.oval:def:4841
The host is installed with Java for Mac OS X before 10.6 Update 3 and is prone to a arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle Mach RPC messages. Successful exploitation could allow attacker to execute arbitrary code.

oval:org.secpod.oval:def:21725
The host is installed with Apple Mac OS X or Server before 10.10.1 or Apple Safari before 6.2.1, 7.x before 7.1.1 or 8.x before 8.0.1 and is prone to use-after-free vulnerability. A flaw is present in the WebKit, which fails to properly handle a crafted page objects in an HTML document. Successful e ...

oval:org.secpod.oval:def:2851
The host is installed with Apple Mac OS X 10.6 through 10.6.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle CFString object. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:2850
The host is installed with Mac OS X 10.6 through 10.6.7 or Apple Safari before 5.0.5 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle images with an embedded ColorSync profile. Successful exploitation could allow attackers to execute arbi ...

oval:org.secpod.oval:def:2856
The host is installed with Apple Mac OS X and is prone to a buffer overflow vulnerability. A flaw is present in the application, as it fails to handle uppercase strings. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

oval:org.secpod.oval:def:2949
The host is installed with Apple Safari version less than or equal to 5.0.5 or Mac OS X 10.6.8 and is prone to heap-based buffer overflow vulnerability. A flaw is present in ImageIO in the application, which fails to handle a crafted TIFF image with CCITT Group 4 encoding. Successful exploitation al ...

oval:org.secpod.oval:def:36963
The host is installed with Apple Safari before 9.1.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:36962
The host is missing a security update according to Apple advisory, APPLE-SA-2016-09-01-1. The update is required to fix a memory corruption vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary c ...

oval:org.secpod.oval:def:37826
The host is installed with Apple Safari before 10.0.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle malicious crafted web content. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:37825
The host is installed with Apple Safari before 10.0.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle malicious crafted web content. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:37824
The host is installed with Apple Safari before 10.0.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle malicious crafted web content. Successful exploitation could allow attackers to disclose user information.

oval:org.secpod.oval:def:37823
The host is missing a security update according to Apple advisory, APPLE-SA-2016-10-24-3. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code o ...

oval:org.secpod.oval:def:38398
The host is installed with Apple Safari before 10.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:38399
The host is installed with Apple Safari before 10.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:38392
The host is installed with Apple Safari before 10.0.2 and is prone to an universal cross site scripting vulnerability. A flaw is present in the application, which fails to properly handle safari reader feature. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:38393
The host is installed with Apple Safari before 10.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:38394
The host is installed with Apple Safari before 10.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:38395
The host is installed with Apple Safari before 10.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:38396
The host is installed with Apple Safari before 10.0.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:38397
The host is installed with Apple Safari before 10.0.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to disclose user information.

oval:org.secpod.oval:def:38400
The host is installed with Apple Safari before 10.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:38401
The host is installed with Apple Safari before 10.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:38402
The host is installed with Apple Safari before 10.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:38403
The host is installed with Apple Safari before 10.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:38404
The host is installed with Apple Safari before 10.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:38405
The host is installed with Apple Safari before 10.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:38417
The host is missing a security update according to Apple advisory, APPLE-SA-2016-09-20-2. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code o ...

oval:org.secpod.oval:def:38410
The host is installed with Apple Safari before 10.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:38411
The host is installed with Apple Safari before 10.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:38412
The host is installed with Apple Safari before 10.0.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to disclose user information.

oval:org.secpod.oval:def:38413
The host is installed with Apple Safari before 10.0.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to disclose user information.

oval:org.secpod.oval:def:38414
The host is installed with Apple Safari before 10.0.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to disclose user information.

oval:org.secpod.oval:def:38415
The host is installed with Apple Safari before 10.0.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to disclose user information.

oval:org.secpod.oval:def:38416
The host is installed with Apple Safari before 10.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to an unexpected application terminatio ...

oval:org.secpod.oval:def:38406
The host is installed with Apple Safari before 10.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:38407
The host is installed with Apple Safari before 10.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:38408
The host is installed with Apple Safari before 10.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:38409
The host is installed with Apple Safari before 10.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:40568
The host is installed with Apple Safari before 10.1.1 and is prone to an address bar spoofing vulnerability. A flaw is present in the application, which fails to properly handle malicious website. Successful exploitation could allow attackers would lead to address bar spoofing.

oval:org.secpod.oval:def:40569
The host is installed with Apple Safari before 10.1.1 and is prone to an address bar spoofing vulnerability. A flaw is present in the application, which fails to properly handle malicious website. Successful exploitation could allow attackers would lead to address bar spoofing.

oval:org.secpod.oval:def:40567
The host is installed with Apple Safari before 10.1.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted webpage. Successful exploitation could allow attackers would lead to an application denial of service.

oval:org.secpod.oval:def:40571
The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to arbitrary code execution ...

oval:org.secpod.oval:def:40572
The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to arbitrary code execution ...

oval:org.secpod.oval:def:40570
The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to arbitrary code execution ...

oval:org.secpod.oval:def:40575
The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to arbitrary code execution ...

oval:org.secpod.oval:def:40576
The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to arbitrary code execution ...

oval:org.secpod.oval:def:40573
The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to arbitrary code execution ...

oval:org.secpod.oval:def:40574
The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to arbitrary code execution ...

oval:org.secpod.oval:def:40579
The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to arbitrary code execution ...

oval:org.secpod.oval:def:40577
The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to arbitrary code execution ...

oval:org.secpod.oval:def:40578
The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to arbitrary code execution ...

oval:org.secpod.oval:def:40582
The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to arbitrary code execution ...

oval:org.secpod.oval:def:40583
The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to arbitrary code execution ...

oval:org.secpod.oval:def:40580
The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to arbitrary code execution ...

oval:org.secpod.oval:def:40581
The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to arbitrary code execution ...

oval:org.secpod.oval:def:40586
The host is installed with Apple Safari before 10.1.1 and is prone to an universal cross site scripting vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to universal cross si ...

oval:org.secpod.oval:def:40587
The host is installed with Apple Safari before 10.1.1 and is prone to an universal cross site scripting vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to universal cross si ...

oval:org.secpod.oval:def:40584
The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to arbitrary code execution ...

oval:org.secpod.oval:def:40585
The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to arbitrary code execution ...

oval:org.secpod.oval:def:40588
The host is installed with Apple Safari before 10.1.1 and is prone to an universal cross site scripting vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to universal cross si ...

oval:org.secpod.oval:def:40589
The host is installed with Apple Safari before 10.1.1 and is prone to an universal cross site scripting vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to universal cross si ...

oval:org.secpod.oval:def:40590
The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to arbitrary code execution ...

oval:org.secpod.oval:def:40593
The host is missing a security update according to Apple advisory, APPLE-SA-2017-05-15-7. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle maliciously crafted web content. Successful exploitation could allow attackers to execute ...

oval:org.secpod.oval:def:40591
The host is installed with Apple Safari before 10.1.1 and is prone to an universal cross site scripting vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers would lead to arbitrary code exe ...

oval:org.secpod.oval:def:40592
The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle memory issues. Successful exploitation could allow attackers would lead to arbitrary code execution.

oval:org.secpod.oval:def:41453
The host is missing a security update according to Apple advisory, APPLE-SA-2017-07-19-5. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle maliciously crafted web content. Successful exploitation could allow attackers to execute ...

oval:org.secpod.oval:def:41428
The host is installed with Apple Safari before 10.1.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted webpage. Successful exploitation could allow attackers to cause denial of service.

oval:org.secpod.oval:def:41429
The host is installed with Apple Safari before 10.1.2 and is prone to a cross-origin bypass vulnerability. A flaw is present in the application, which fails to properly handle malicious website. Successful exploitation could allow attackers to exfiltrate data cross-origin.

oval:org.secpod.oval:def:41430
The host is installed with Apple Safari before 10.1.2 and is prone to an address bar spoofing vulnerability. A flaw is present in the application, which fails to properly handle malicious website. Successful exploitation could allow attackers to lead to address bar spoofing.

oval:org.secpod.oval:def:41433
The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code

oval:org.secpod.oval:def:41434
The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code

oval:org.secpod.oval:def:41431
The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code

oval:org.secpod.oval:def:41432
The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code

oval:org.secpod.oval:def:41437
The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code

oval:org.secpod.oval:def:41438
The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code

oval:org.secpod.oval:def:41435
The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code

oval:org.secpod.oval:def:41436
The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code

oval:org.secpod.oval:def:41439
The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code

oval:org.secpod.oval:def:41440
The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code

oval:org.secpod.oval:def:41441
The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code

oval:org.secpod.oval:def:41444
The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code

oval:org.secpod.oval:def:41445
The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code

oval:org.secpod.oval:def:41442
The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code

oval:org.secpod.oval:def:41443
The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code

oval:org.secpod.oval:def:41448
The host is installed with Apple Safari before 10.1.2 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to cause cross site scripting.

oval:org.secpod.oval:def:41449
The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code

oval:org.secpod.oval:def:41446
The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code

oval:org.secpod.oval:def:41447
The host is installed with Apple Safari before 10.1.2 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to cause cross site scripting.

oval:org.secpod.oval:def:41451
The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code

oval:org.secpod.oval:def:41452
The host is installed with Apple Safari before 10.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code

oval:org.secpod.oval:def:41450
The host is installed with Apple Safari before 10.1.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly process maliciously crafted web content. Successful exploitation could allow attackers to read restricted memory.

oval:org.secpod.oval:def:42138
The host is installed with Apple Safari before 11 and is prone to an universal cross site scripting vulnerability. A flaw is present in the application, which fails to properly handle the parent-tab. Successful exploitation could allow attackers to lead to universal cross site scripting.

oval:org.secpod.oval:def:42137
The host is installed with Apple Safari before 11 and is prone to an address bar spoofing vulnerability. A flaw is present in the application, which fails to properly handle a malicious website. Successful exploitation could allow attackers to lead to address bar spoofing.

oval:org.secpod.oval:def:42139
The host is installed with Apple Safari before 11 and is prone to an address bar spoofing vulnerability. A flaw is present in the application, which fails to properly handle a malicious website. Successful exploitation could allow attackers to lead to address bar spoofing.

oval:org.secpod.oval:def:42140
The host is missing a security update according to Apple advisory, APPLE-SA-2017-09-20-2. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle a malicious website. Successful exploitation could allow attackers to lead to add ...

oval:org.secpod.oval:def:37336
The host is installed with Apple Mac OS X 10.8 before 10.13 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle libarchive. Successful exploitation could allow remote attackers to corrupt memory.

oval:org.secpod.oval:def:7587
The host is missing important security update according to Apple advisory, APPLE-SA-2012-10-16-1. The update is required to fix multiple unspecified vulnerabilities. The flaws are present in the application, which fails to properly handle certain vectors. Successful exploitation allows attackers to ...

oval:org.secpod.oval:def:7567
The host is installed with Oracle Java SE 6 Update 35 or earlier or JavaFX 2.2 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle specially crafted content. Successful exploitation allows attackers to affect confidentiality, integrity, a ...

oval:org.secpod.oval:def:7582
The host is installed with Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to JSSE. Successful exploitation allows remote attackers to affect availability.

oval:org.secpod.oval:def:7583
The host is installed with Oracle Java SE 6 Update 35 or earlier or Java FX 2.2 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related 2D. Successful exploitation allows remote attackers to affect confidentiality, integrity, ...

oval:org.secpod.oval:def:42604
The host is installed with Apple Safari before 11.0.1 and is prone to an address bar spoofing vulnerability. A flaw is present in the application, which fails to properly handle a malicious website. Successful exploitation could allow attackers to lead to address bar spoofing.

oval:org.secpod.oval:def:42603
The host is installed with Apple Safari before 11.0.1 and is prone to an address bar spoofing vulnerability. A flaw is present in the application, which fails to properly handle a malicious website. Successful exploitation could allow attackers to lead to address bar spoofing.

oval:org.secpod.oval:def:2017
The host is installed with Apple QuickTime before 7.7 or Apple Mac OS X 10.6.8 and is prone to heap based overflow vulnerability. A flaw is present in the application which fails to properly handle STSS atoms in a QuickTime movie file. Successful exploitation allows remote attackers to execute arbit ...

oval:org.secpod.oval:def:2016
The host is installed with Apple QuickTime before 7.7 or Mac OS X 10.6.8 and is prone to heap based overflow vulnerability. A flaw is present in the application which fails to properly handle STSZ atoms in a QuickTime movie file. Successful exploitation allows remote attackers to execute arbitrary c ...

oval:org.secpod.oval:def:2018
The host is installed with Apple QuickTime before 7.7 or Apple Mac OS X 10.6.8 and is prone to heap based overflow vulnerability. A flaw is present in the application which fails to properly handle STSC atoms in a QuickTime movie file. Successful exploitation allows remote attackers to execute arbit ...

oval:org.secpod.oval:def:3044
The host is installed with Apple QuickTime and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a specially crafted QTVR (QuickTime Virtual Reality) movie file. Successful exploitation allow remote attackers to execute arbitrary code o ...

oval:org.secpod.oval:def:3042
The host is installed with Apple QuickTime and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to properly handle a specially crafted movie file. Successful exploitation allow remote attackers to execute arbitrary code or cause a denial of service (appli ...

oval:org.secpod.oval:def:3043
The host is installed with Apple QuickTime and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a specially crafted flashpix file. Successful exploitation allow remote attackers to execute arbitrary code or cause a denial of service (a ...

oval:org.secpod.oval:def:32697
The host is missing a security update according to Apple advisory, APPLE-SA-2015-12-08-3. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows remote attackers to execute arbitrary code wi ...

oval:org.secpod.oval:def:32700
The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.4, 10.11.x before 10.11.3 and is prone to an arbitrary code vulnerability. A flaw is present in the application, which fails to properly handle a crafted website. Successful exploitation allows remote attackers to ex ...

oval:org.secpod.oval:def:14156
The host is installed with Apple Mac OS X Server 10.6.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which does not properly consider differences in parameter handling. Successful exploitation could allow an attacker to execute arbitrary code.

oval:org.secpod.oval:def:13778
The host is installed with Apple Mac OS X Server 10.6.8, 10.7 through 10.7.5 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle XML parameters. Successful exploitation could allow an attacker to execute arbitrary code.

oval:org.secpod.oval:def:14158
The host is installed with Apple Mac OS X Server 10.6.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle crafted serialized attributes. Successful exploitation could allow an attacker to execute arbitrary code.

oval:org.secpod.oval:def:15481
The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to information Disclosure Vulnerability. The flaw is present in the The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in O ...

oval:org.secpod.oval:def:13779
The host is installed with Apple Mac OS X Server 10.7 through 10.7.5, Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle crafted JSON data. Successful exploitation could ...

oval:org.secpod.oval:def:17025
The host is installed with Apple Mac OS X or Server 10.7.5, 10.8.5, 10.9 or 10.9.1 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate. Success ...

oval:org.secpod.oval:def:21749
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9 through 10.9.5 or 10.10 before 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the apache, which fails to properly handle a crafted DAV WRITE request. Successful exploitation allows attackers to cause a ...

oval:org.secpod.oval:def:17524
The host is installed with Apple Mac OS X 10.9.2 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to properly handle YAML tags. Successful exploitation allows attackers to cause an unexpected application termination or arbitrary code execution.

oval:org.secpod.oval:def:21750
The host is installed with Apple Mac OS X or Server before 10.8.5, 10.9.x before 10.9.5 or 10.10 before 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted cookie. Successful exploitation allows attackers to cause ...

oval:org.secpod.oval:def:21261
The host is installed with Apple Mac OS X or Server 10.9 through 10.9.4 and is prone to heap buffer overflow vulnerability. The flaw is present in the application, which fails to properly handle percent-encoded characters in a URI. Successful exploitation allows remote attacker may be able to cause ...

oval:org.secpod.oval:def:26587
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which does not properly invoke initdb to specify the authentication requirements for a database cluster to be used ...

oval:org.secpod.oval:def:26700
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not properly check environment variables for the env_delete restriction. Successful exploitation allows local users with sudo ...

oval:org.secpod.oval:def:21253
The host is installed with Apple Mac OS X or Server 10.7.5, OS X 10.8.5 or OS X 10.9 through 10.9.4 and is prone to multiple vulnerabilities. The flaws are present in the application, which does not ensure that certain swap operations have a constant-time behavior. Successful exploitation may lead t ...

oval:org.secpod.oval:def:10717
The host is installed with Mac OS X 10.6.8 or 10.7 before 10.7.5 or 10.8.x before 10.8.2 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation allows remote attackers to produce an unspecified impact.

oval:org.secpod.oval:def:10704
The host is installed with Mac OS X 10.6.8 or OS X Lion v10.7 to v10.7.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted text chunk in a PNG image file. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3901
The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a denial of service vulnerability. The flaw is present in the application, which fails to properly handle a malformed HTTP request. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:15494
The host is missing an important security update according to Apple advisory, APPLE-SA-2013-09-12-1. The update is required to fix multiple vulnerabilities. The flaw are present in the application, which fails to handle a crafted application. Successful exploitation could allow attackers to crash th ...

oval:org.secpod.oval:def:15462
The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to arbitrary code execution vulnerability. The flaw is present in the envvars (aka envvars-std) in the Apache HTTP Server before 2.4.2, which pl ...

oval:org.secpod.oval:def:13772
The host is installed with Apple Mac OS X or Apple Mac OS X Server 10.6.8, 10.7 through 10.7.5, or 10.8 before 10.8.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted TIFF images. Successful exploitation could allow attacke ...

oval:org.secpod.oval:def:21262
The host is missing a security update according to Apple advisory, APPLE-SA-2014-09-17-3. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle certain objects and security vectors. Successful exploitation allows attackers to execute ...

oval:org.secpod.oval:def:21231
The host is installed with with Apple Mac OS X or Server 10.8.5, 10.9 through 10.9.5 or 10.10 before 10.10.3 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted ASCII file that triggers a large amount of backtracking. Successfu ...

oval:org.secpod.oval:def:42909
The host is installed with Apple Mac OS X 10.13 or 10.13.1 and is prone to an authentication bypass vulnerability. The flaw is present in the application, which fails to properly handle the validation of credentials. Successful exploitation could allow attackers to bypass administrator authenticatio ...

oval:org.secpod.oval:def:42908
The host is missing a security update according to APPLE-SA-2017-11-29-1. The update is required to fix an authentication bypass vulnerability. A flaw is present in the application, which fails to properly handle validation of credentials. Successful exploitation could allow attackers to bypass admi ...

oval:org.secpod.oval:def:20189
The host is installed with Apple Mac OS X or Server 10.9 through 10.9.3 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to properly handle NTLM connections. Successful exploitation allowed an attacker to gain access to another user's session.

oval:org.secpod.oval:def:20170
The host is missing a security update according to Apple advisory, APPLE-SA-2014-06-30-2. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle certain objects and security vectors. Successful exploitation allows attackers to execute ...

oval:org.secpod.oval:def:39653
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to properly handle a forwarded agent-socket. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39655
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly consider the effects of realloc on buffer contents. Successful exploitation could allow local users to obtain sensitive p ...

oval:org.secpod.oval:def:39656
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly consider the effects of realloc on buffer contents. Successful exploitation could allow local users to obtain sensitive p ...

oval:org.secpod.oval:def:34662
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to an unexpe ...

oval:org.secpod.oval:def:34663
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to have unsp ...

oval:org.secpod.oval:def:34660
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to an unexpe ...

oval:org.secpod.oval:def:34661
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to an unexpe ...

oval:org.secpod.oval:def:34666
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to an unexpe ...

oval:org.secpod.oval:def:34667
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to an unexpe ...

oval:org.secpod.oval:def:34664
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to an unexpe ...

oval:org.secpod.oval:def:34665
The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to an unexpe ...

oval:org.secpod.oval:def:34679
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to cause unspecified impact.

oval:org.secpod.oval:def:34678
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to cause unspecified impact.

oval:org.secpod.oval:def:34682
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to cause unspecified impact.

oval:org.secpod.oval:def:34683
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to cause unspecified impact.

oval:org.secpod.oval:def:34680
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to cause unspecified impact.

oval:org.secpod.oval:def:34681
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to cause unspecified impact.

oval:org.secpod.oval:def:38510
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to curl. Successful exploitation could allow attackers to leak sensitive u ...

oval:org.secpod.oval:def:38511
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to curl. Successful exploitation could allow attackers to leak sensitive u ...

oval:org.secpod.oval:def:39658
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted zip archives. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:37356
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected application termination or arbitrary code execut ...

oval:org.secpod.oval:def:37359
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected application termination or arbitrary code execut ...

oval:org.secpod.oval:def:37358
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected application termination or arbitrary code execut ...

oval:org.secpod.oval:def:37361
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected application termination or arbitrary code execut ...

oval:org.secpod.oval:def:37360
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected application termination or arbitrary code execut ...

oval:org.secpod.oval:def:37363
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected application termination or arbitrary code execut ...

oval:org.secpod.oval:def:37370
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected application termination or arbitrary code execut ...

oval:org.secpod.oval:def:37369
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected application termination or arbitrary code execut ...

oval:org.secpod.oval:def:37368
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected application termination or arbitrary code execut ...

oval:org.secpod.oval:def:37367
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected application termination or arbitrary code execut ...

oval:org.secpod.oval:def:37366
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected application termination or arbitrary code execut ...

oval:org.secpod.oval:def:37365
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected application termination or arbitrary code execut ...

oval:org.secpod.oval:def:37364
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected application termination or arbitrary code execut ...

oval:org.secpod.oval:def:37371
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected application termination or arbitrary code execut ...

oval:org.secpod.oval:def:38514
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to curl. Successful exploitation could allow attackers to leak sensitive u ...

oval:org.secpod.oval:def:39670
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39667
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39668
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39669
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39674
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39675
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39676
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39677
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39678
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39679
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39671
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39672
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39673
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39685
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39680
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39681
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39682
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39683
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39684
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39686
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39687
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39688
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39690
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39691
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39692
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39689
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39693
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39694
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39695
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39696
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39708
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a heap buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39710
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a t2p_process_jpeg_strip heap buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39711
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39714
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a cpStripToTile heap-buffer-overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39709
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a predictor heap buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39697
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39698
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39699
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39700
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39701
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39702
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39704
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39705
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39706
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39707
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39703
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:4292
The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle crafted compressed data. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3917
The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which unconditionally performs credential delegation. Successful exploitation could allow attackers to impersonate clients via GSSAPI reques ...

oval:org.secpod.oval:def:5798
The host is installed with Apple Mac OS X 10.7 before 10.7.4 and is prone to an integer underflow vulnerability. A flaw is present in the application, which fails to properly a crafted catalog file in an HFS disk image. Successful exploitation could allow attackers to execute arbitrary code or cause ...

oval:org.secpod.oval:def:10707
The host is installed with OS X Lion v10.7 to v10.7.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a crafted program. Successful exploitation could allow attackers to bypass sandbox restrictions and execute arbitrary code.

oval:org.secpod.oval:def:14151
The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.3, Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to information disclosure vulnerability. A flaw is present in the application, which does not pro ...

oval:org.secpod.oval:def:14152
The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.3, Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to han ...

oval:org.secpod.oval:def:14153
The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.3, Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to han ...

oval:org.secpod.oval:def:26687
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted string. Successful exploitation allows remote attackers to execute arbitrary code.

oval:org.secpod.oval:def:26637
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not properly handle IP addresses in cookie domain names. Successful exploitation allows attackers to set cookies for or send a ...

oval:org.secpod.oval:def:26639
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which does not properly copy HTTP POST data for an easy handle, which triggers an out-of-bounds read. Successful exploitation all ...

oval:org.secpod.oval:def:26688
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a large size and offset in a "buffer" function. Successful exploitation allows context-dependent attackers ...

oval:org.secpod.oval:def:25255
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in libtiff, which fails to handle unspecified vectors. Successful exploitation allows attackers to arbitrary code execution.

oval:org.secpod.oval:def:26640
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a CRLF injection vulnerability. A flaw is present in the application, which fails to handle CRLF sequences in a URL. Successful exploitation allows remote attackers to inject arbitrary HTTP headers and conduc ...

oval:org.secpod.oval:def:26689
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a SSL servers spoofing vulnerability. A flaw is present in the application, when accessing an HTTPS URL, do not (a) check the certificate against a trust store or verify that the server hostname matches a dom ...

oval:org.secpod.oval:def:30934
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a double free vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation allow attackers to crash the service.

oval:org.secpod.oval:def:26701
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not perform any checks of the TZ environment variable value. Successful exploitation allows local user with privileges to exec ...

oval:org.secpod.oval:def:30877
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle vectors that trigger creation of multiple dictionaries. Successful exploitation could allow attacke ...

oval:org.secpod.oval:def:30878
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a buffer over-read vulnerability. A flaw is present in the application, which fails to properly handle a crafted GIF image. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:25300
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle a malformed Elliptic Curve (EC) private-key file that is improperly handled during import. Successful exploitation ...

oval:org.secpod.oval:def:26609
The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted WebSocket Ping frame. Successful exploitation allows attackers to cause a denial of service ( ...

oval:org.secpod.oval:def:26610
The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which does not initialize the protocol structure member. Successful exploitation allows attackers to cause a denial of servic ...

oval:org.secpod.oval:def:26707
The host is missing a security update according to Apple advisory, APPLE-SA-2015-08-13-2. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle a crafted vectors. Successful exploitation may lead to an unexpected application terminati ...

oval:org.secpod.oval:def:30880
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an uninitialized pointer free vulnerability. A flaw is present in the application, which fails to properly handle a crafted EXIF data in a JPEG image. Successful exploitation could allow attackers to execute arbi ...

oval:org.secpod.oval:def:31475
The host is installed with Apple Mac OS X or Server 10.6.8 through 10.8.x, 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to multiple use-after-free vulnerabilities. The flaws are present in the application, which fails to properly handle crafted serialized input containing a (1) R or (2) r ...

oval:org.secpod.oval:def:25301
The host is installed with Apple Mac OS X or Server 10.8, 10.9 or before 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted X.509 certificate to an endpoint that uses the certificate-verification feature. Successful exploi ...

oval:org.secpod.oval:def:25262
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which requires a correct MAC only if the MAC field has a nonzero length. Successful exploitation allows attackers to ...

oval:org.secpod.oval:def:25263
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which requires a correct MAC only if the MAC field has a nonzero length. Successful exploitation allows attackers to ...

oval:org.secpod.oval:def:30883
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle vectors that trigger an attempted renaming of a Phar archive to the name of an existing file. Successful explo ...

oval:org.secpod.oval:def:26614
The host is installed with Apple Mac OS X or Server 10.8, 10.9 or before 10.10.5 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle a crafted unserialize call that leverages use of the unset function within an __wakeup function. Successful ex ...

oval:org.secpod.oval:def:26613
The host is installed with Apple Mac OS X or Server 10.8, 10.9 or before 10.10.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted length value in conjunction with crafted serialized data in a phar archive. Successful explo ...

oval:org.secpod.oval:def:26611
The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.4 and is prone to a HTTP request smuggling vulnerability. A flaw is present in the application, which fails to handle a crafted request. Successful exploitation allows attackers to conduct HTTP request smuggling atta ...

oval:org.secpod.oval:def:26612
The host is installed with Xcode before 7.0 on Apple Mac OS X 10.10.4 or later, Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not consider that a Require directive may be associated with an ...

oval:org.secpod.oval:def:26642
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not properly re-use NTLM connections. Successful exploitation allows remote attackers to connect as other users.

oval:org.secpod.oval:def:26645
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not properly re-use authenticated Negotiate connections. Successful exploitation allows remote attackers to connect as other u ...

oval:org.secpod.oval:def:26615
The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.4 and is prone to a denial vulnerability. A flaw is present in the application, which fails to handle a crafted tar archive. Successful exploitation allows attackers to cause a denial of service (heap metadata corrup ...

oval:org.secpod.oval:def:26616
The host is installed with Apple Mac OS X or Server 10.8, 10.9 or before 10.10.5 and is prone to multiple stack-based buffer overflow vulnerabilities. The flaws are present in the application, which fails to handle a crafted length value in a (1) tar, (2) phar, or (3) ZIP archive. Successful exploit ...

oval:org.secpod.oval:def:25288
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to a cipher-downgrade vulnerability. A flaw is present in the application, which does not properly convey a DHE_EXPORT choice. Successful exploitation allows man-in-the-middle attackers to conduct cipher-downgra ...

oval:org.secpod.oval:def:26619
The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.4 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle a long reply to a LIST command. Successful exploitation allows attackers to execute arbitrary code.

oval:org.secpod.oval:def:26618
The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which does not verify that the first character of a filename is different from the \0 character. Successful exploitation allo ...

oval:org.secpod.oval:def:26620
The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.4 and is prone to an algorithmic complexity vulnerability. A flaw is present in the application, which fails to handle crafted form data that triggers an improper order-of-growth outcome. Successful exploitation allo ...

oval:org.secpod.oval:def:26622
The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which truncates a pathname upon encountering a \x00 character in certain situations. Successful exploitation allows attackers t ...

oval:org.secpod.oval:def:26621
The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which truncates a pathname upon encountering a \x00 character in certain situations. Successful exploitation allows attackers t ...

oval:org.secpod.oval:def:26624
The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which does not verify that the uri property is a string. Successful exploitation allows attackers to obtain sensitive i ...

oval:org.secpod.oval:def:26623
The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.4 and is prone to an arbitrary code vulnerability. A flaw is present in the application, which does not verify that __default_headers is an array. Successful exploitation allows attackers to execute arbitrary code by ...

oval:org.secpod.oval:def:34617
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.5 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to cause unspecified impact.

oval:org.secpod.oval:def:34616
The host is missing a security update according to Apple advisory, APPLE-SA-2016-05-16-4. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to caus ...

oval:org.secpod.oval:def:3129
The host is installed with Apache HTTP Server before 2.2.18 and is prone to a stack consumption vulnerability. A flaw is present in the application, which fails to handle *? sequences in the first argument. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:5799
The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to properly handle tar archives and iso9660 files. Successful exploitation could allow attackers to execute arbitra ...

oval:org.secpod.oval:def:5800
The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted tar archive. Successful exploitation could allow attackers to execute arbitrary code or crash the s ...

oval:org.secpod.oval:def:3930
The host is missing a critical security update according to Apple advisory, APPLE-SA-2012-02-01-1. The update is required to fix multiple vulnerabilities. The flaws are present in the applications which fail to sanitize user supplied input. Successful exploitation could allow attackers to execute ar ...

oval:org.secpod.oval:def:3915
The host is installed with Apple Mac OS X 10.6.8 and is prone to an information disclosure vulnerability. A flaw is present in the application, which incorrectly creates log entries containing passwords upon encountering errors in JMX user creation. Successful exploitation could allow attackers to o ...

oval:org.secpod.oval:def:5795
The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.4 and is prone to a man in the middle attack vulnerability. A flaw is present in the application, which fails to properly handle confidentiality of SSL encrypted data. Successful exploitation could allow attackers to decrypt data ...

oval:org.secpod.oval:def:10695
The host is installed with Mac OS X 10.6.8 or OS X Lion v10.7 to v10.7.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which is caused by an error in mod_proxy when configured in reverse proxy mode and using the RewriteRule or ProxyPassMatch directive ...

oval:org.secpod.oval:def:2367
The host is installed with Opera before 11.51 or Apple Mac OS X 10.6.8 or 10.7x before 10.7.3 and is prone to unspecified vulnerability. A flaw is present in the application which is caused due to some unspecified error. Successful exploitation allows attackers to cause unknown impacts.

oval:org.secpod.oval:def:3892
The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to an integer overflow vulnerability. The flaw is present in the application, which fails to properly handle crafted DNS data. Successful exploitation could allow attackers to execute arbitrary code or crash the se ...

oval:org.secpod.oval:def:3954
The host is installed with Apple Mac OS X 10.6.8 or 10.7.2 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to AWT . Successful exploitation could allow attackers to affect confidentiality, integrity, and availability.

oval:org.secpod.oval:def:10696
The host is installed with Mac OS X 10.6.8 or OS X Lion v10.7 to v10.7.4 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header. Successful ex ...

oval:org.secpod.oval:def:10697
The host is installed with Mac OS X 10.6.8 or OS X Lion v10.7 to v10.7.4 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to interact with use of RewriteRule and ProxyPassMatch pattern matches for configuration of a reverse proxy. Successful exp ...

oval:org.secpod.oval:def:10701
The host is installed with Mac OS X Lion v10.7 to v10.7.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle reachable assertion issue existed in the handling of DNS records. Successful exploitation could allow attackers to crash the servic ...

oval:org.secpod.oval:def:5806
The host is installed with Apple Mac OS X 10.7.0 before 10.7.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly restrict the ability to trigger hash collisions. Successful exploitation could allow attackers to cause a denial of service.

oval:org.secpod.oval:def:5796
The host is installed with Apple Mac OS X 10.7.x before 10.7.4 and is prone to a data-injection attack vulnerability. A flaw is present in the application, which fails to properly handle a crafted URL. Successful exploitation may lead to protocol-specific data injection attacks.

oval:org.secpod.oval:def:5807
The host is installed with Apple Mac OS X 10.7.0 before 10.7.4 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a request containing a large number of variables. Successful exploitation could allow attackers to execute ar ...

oval:org.secpod.oval:def:17525
The host is installed with Apple Mac OS X or Server 10.7.5, OS X 10.8.5 or OS X 10.9.2 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle the conversion of a string to a floating point value. Successful exploitation allows a ...

oval:org.secpod.oval:def:17528
The host is missing a security update according to Apple advisory, APPLE-SA-2014-04-22-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle certain objects and security vectors. Successful exploitation allows attackers to execute ...

oval:org.secpod.oval:def:17028
The host is installed with Apple Mac OS X or Server 10.7.5, 10.8.5, 10.9 or 10.9.1 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate. Success ...

oval:org.secpod.oval:def:17037
The host is missing a security update according to Apple advisory, APPLE-SA-2014-02-25-1. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fail to handle certain vectors related to memory and crafted data. Successful exploitation allows attacke ...

oval:org.secpod.oval:def:39596
The host is installed with Apple Mac OS X 10.8 before 10.13 and is prone to a http request redirection vulnerability. A flaw is present in the application, which fails to properly handle a malicious HTTP request. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:10698
The host is installed with Mac OS X 10.6.8 or OS X Lion v10.7 to v10.7.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a %{}C format string. Successful exploitation allows remote attackers to crash the service.

oval:org.secpod.oval:def:10699
The host is installed with Mac OS X 10.6.8 or OS X Lion v10.7 to v10.7.4 and is prone to a denial of service vulnerability. A flaw is present in the application, due to an invalid call to the free function. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:10700
The host is installed with Mac OS X 10.6.8 or OS X Lion v10.7 to v10.7.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted web script. Successful exploitation could allow attackers to obtain the values of HTTPOnly cookies.

oval:org.secpod.oval:def:5816
The host is installed with Apple Mac OS X 10.6.8 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a Batched (aka AndX) request that triggers infinite recursion. Successful exploitation could allow attackers to execute ar ...

oval:org.secpod.oval:def:10711
The host is installed with Mac OS X 10.6.8 or 10.7 before 10.7.5 or 10.8.x before 10.8.2 and is prone to a SQL injection vulnerability. A flaw is present in the application, which fails to properly perform a temporary change to the magic_quotes_gpc directive during the importing of environment varia ...

oval:org.secpod.oval:def:10705
The host is installed with Mac OS X 10.6.8 or OS X Lion v10.7 to v10.7.4 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted tiff image. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

oval:org.secpod.oval:def:10712
The host is installed with Mac OS X 10.6.8 or 10.7 before 10.7.5 or 10.8.x before 10.8.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle invalid [ (open square bracket) characters in name values. Successful exploitation could al ...

oval:org.secpod.oval:def:5817
The host is installed with Apple Mac OS X 10.6.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted RPC call. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

oval:org.secpod.oval:def:5820
The host is missing an important security update according to Apple advisory, APPLE-SA-2012-05-09-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to execute ...

oval:org.secpod.oval:def:10718
The host is installed with Mac OS X 10.7 before 10.7.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation allows remote attackers to execute arbitrary code or crash the service.

oval:org.secpod.oval:def:10713
The host is installed with Mac OS X 10.6.8 or 10.7 before 10.7.5 or 10.8.x before 10.8.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle query strings that lack an = (equals sign). Successful exploitation could allow att ...

oval:org.secpod.oval:def:10715
The host is installed with Mac OS X 10.6.8 or 10.7 before 10.7.5 or 10.8.x before 10.8.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle query strings that contain a %3D sequence but no = (equals sign) character. Success ...

oval:org.secpod.oval:def:30905
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted text. Successful exploitation could allow attackers to crash the service or execute arbitra ...

oval:org.secpod.oval:def:30906
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle crafted text. Successful exploitation could allow attackers to crash the service or execute arbitrary code.

oval:org.secpod.oval:def:25305
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted CLIENT-MASTER-KEY message. Successful exploitation allows remote attackers to cause denial of service ( ...

oval:org.secpod.oval:def:25312
The host is missing a security update according to Apple advisory, APPLE-SA-2015-06-30-2. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle a crafted vectors. Successful exploitation leads to information disclosure, security bypas ...

oval:org.secpod.oval:def:10706
The host is installed with Mac OS X 10.6.8 or OS X Lion v10.7 to v10.7.4 and is prone to a stack based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted locale ID that is not properly handled during variant canonicalization. Successful exploitation ...

oval:org.secpod.oval:def:10725
The host is installed with Apple Mac OS X 10.6.8, 10.7 before 10.7.5 or 10.8 before 10.8.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:30907
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to produce unknown impact.

oval:org.secpod.oval:def:30961
The host is missing a security update according to Apple advisory, APPLE-SA-2015-09-30-3. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to execute arbitrary code, dis ...

oval:org.secpod.oval:def:31521
The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle pre-authentication process. Successful exploitation could allow attackers to conduct impersonation attacks.

oval:org.secpod.oval:def:31533
The host is missing a security update according to Apple advisory, APPLE-SA-2015-10-21-4. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to execute arbitrary code, dis ...

oval:org.secpod.oval:def:4644
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Adobe Flash Player before 9.0.289.0, 10.x before 10.1.102.64 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow remote a ...

oval:org.secpod.oval:def:4658
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. ...

oval:org.secpod.oval:def:4659
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Succe ...

oval:org.secpod.oval:def:4656
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.280.0, 10.x before 10.1.82.76 or Adobe AIR before 2.0.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful ...

oval:org.secpod.oval:def:4625
The host is installed with Adobe Flash Player before 9.0.289.0, 10.x before 10.1.102.64 or Apple Mac OS X 10.5.8 or Apple Mac OS X 10.6 before 10.6.4 and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to handle a Trojan horse dwmapi.dll that is ...

oval:org.secpod.oval:def:4631
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Adobe Flash Player before 9.0.289.0, 10.x before 10.1.102.64 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle crafted SWF content. Successful exploitation could a ...

oval:org.secpod.oval:def:4637
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Adobe Flash Player before 9.0.289.0, 10.x before 10.1.102.64 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow remote a ...

oval:org.secpod.oval:def:4638
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Adobe Flash Player before 9.0.289.0, 10.x before 10.1.102.64 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow remote a ...

oval:org.secpod.oval:def:4683
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a heap memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. ...

oval:org.secpod.oval:def:4684
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to an array index error vulnerability. A flaw is present in the application, which fails to handle unspecified types of Adob ...

oval:org.secpod.oval:def:4681
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successf ...

oval:org.secpod.oval:def:4680
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Succe ...

oval:org.secpod.oval:def:4662
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a remote code vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful ...

oval:org.secpod.oval:def:4660
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Succe ...

oval:org.secpod.oval:def:4665
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Succe ...

oval:org.secpod.oval:def:4666
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Succe ...

oval:org.secpod.oval:def:4663
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Succe ...

oval:org.secpod.oval:def:4664
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Succe ...

oval:org.secpod.oval:def:4669
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Succe ...

oval:org.secpod.oval:def:4667
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Succe ...

oval:org.secpod.oval:def:4673
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors, relat ...

oval:org.secpod.oval:def:4671
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Succe ...

oval:org.secpod.oval:def:4676
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Succe ...

oval:org.secpod.oval:def:4677
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Succe ...

oval:org.secpod.oval:def:4674
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow remote attackers to crash the ...

oval:org.secpod.oval:def:4721
The host is installed with Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64; Adobe AIR before 2.0.2.12610; Apple Mac OS X 10.5.8 or 10.6 before 10.6.5 and is prone to an unspecified vulnerability. A flaw is present in the applications, which fail to properly sanitize user supplied inpu ...

oval:org.secpod.oval:def:4728
The host is installed with Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64; Adobe AIR before 2.0.2.12610; Apple Mac OS X 10.5.8 or 10.6 before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the applications, which fail to properly handle a HTTP request ...

oval:org.secpod.oval:def:4716
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.280.0, 10.x before 10.1.82.76 or Adobe AIR before 2.0.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful exp ...

oval:org.secpod.oval:def:39629
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted image. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3514
The host is installed with Apple Mac OS X 10.5.8 or 10.6.2 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the application, which fail to sanitize user supplied input. Successful exploitation could allow attackers to execute arbitrary code, crash the service or c ...

oval:org.secpod.oval:def:3512
The host is installed with Apple Mac OS X 10.5.8 or 10.6.2 and is prone to multiple unspecified vulnerabilities. The flaw are present in the applications, which fail to sanitize user supplied input. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:3507
The host is installed with Apple Mac OS X 10.5.8 or 10.6.2 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the applications, which fail to handle crafted dimensions of JPEG data in an SWF file. Successful exploitation could allow attackers to overflow the buffer.

oval:org.secpod.oval:def:3508
The host is installed with Apple Mac OS X 10.5.8 or 10.6.2 and is prone to an unspecified vulnerability. A flaw is present in the applications, which fail to handle vectors, related to a "data injection vulnerability." Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:3770
The host is installed with Apple Quicktime before 7.6.6 or Apple Mac OS X 10.6 before 10.6.2 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to handle crafted audio content with QDMC encoding. Successful exploitation could allow attac ...

oval:org.secpod.oval:def:3739
The host is installed with Apple Mac OS X 10.5.8 or 10.6.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle the (1) CAB and (2) 7z file formats. Successful exploitation could attackers to bypass virus detection.

oval:org.secpod.oval:def:3869
The host is missing an important security update according to Apple advisory, APPLE-SA-2010-03-29-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly sanitize user supplied input. Successful exploitation could allow attackers t ...

oval:org.secpod.oval:def:3740
The host is installed with Apple Mac OS X 10.5.8 or 10.6.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted CAB archive that uses the Quantum (aka .Q) compression format. Successful exploitation could attackers to crash ...

oval:org.secpod.oval:def:3748
The host is missing an important security update according to Apple advisory, APPLE-SA-2010-08-24-1. The update is required to fix multiple vulnerabilities. A flaw is present in the application, which fails to properly sanitize user supplied input. Successful exploitation could allow attackers to cr ...

oval:org.secpod.oval:def:3116
The host is installed with Apple Mac OS X 10.6.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to determine the security status of an NS RRset during a DNSKEY algorithm rollover. Successful exploitation could allow attackers to crash the service ...

oval:org.secpod.oval:def:4645
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Adobe Flash Player before 9.0.289.0, 10.x before 10.1.102.64 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow remote a ...

oval:org.secpod.oval:def:2860
The host is installed with Apple Mac OS X 10.5.8 or 10.6 through 10.6.8 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to validate patch files. Successful exploitation could allow attackers to create or overwrite arbitrary files.

oval:org.secpod.oval:def:2880
The host is missing an update according to Apple advisory APPLE-SA-2011-06-23-1. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fail to handle malicious input. Successful exploitation could allow attackers to execute arbitrary code, gain sens ...

oval:org.secpod.oval:def:3159
The host is installed with Apple Mac OS X 10.6.8 and 10.7.0 before 10.7.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to detect recursion during entity expansion. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3111
The host is installed with Apple Mac OS X 10.7 before 10.7.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a negative response containing large RRSIG RRsets. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:13788
The host is missing a security update according to Apple advisory, APPLE-SA-2013-03-14-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary ...

oval:org.secpod.oval:def:4986
The host is installed with Google Chrome before 18.0.1025.142 or Apple Mac OS X 10.6.8, 10.7 through 10.7.5, or 10.8 before 10.8.3 and is prone to cross-site scripting vulnerability. A flaw is present in the applications, which fail to handle the EUC-JP encoding system. Successful exploitation could ...

oval:org.secpod.oval:def:21790
The host is installed with Apple Mac OS X or Server before 10.10 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted environment. Successful exploitation allows attackers to execute arbitrary code.

oval:org.secpod.oval:def:21354
The host is installed with Apple Mac OS X or Server 10.7 through 10.7.5, 10.8 through 10.8.5 or 10.9 through 10.9.5 and is prone to arbitrary code execution vulnerability. A flaw is present in the Bash's parsing of environment variables, which fails to properly handle a crafted environment. Successf ...

oval:org.secpod.oval:def:21353
The host is missing a security update according to Apple advisory, APPLE-SA-2014-09-29-1. The update is required to fix arbitrary code execution vulnerability. The flaw is present in the Bash's parsing of environment variables, which fails to handle certain vectors related to memory and crafted data ...

oval:org.secpod.oval:def:37308
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code.

oval:org.secpod.oval:def:37306
The host is missing a critical security update according to Apple advisory, APPLE-SA-2016-09-20. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arb ...

oval:org.secpod.oval:def:42607
The host is installed with Apple Safari before 11.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitrary code execution.

oval:org.secpod.oval:def:42608
The host is installed with Apple Safari before 11.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitrary code execution.

oval:org.secpod.oval:def:42606
The host is installed with Apple Safari before 11.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitrary code execution.

oval:org.secpod.oval:def:42605
The host is installed with Apple Safari before 11.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitrary code execution.

oval:org.secpod.oval:def:42610
The host is installed with Apple Safari before 11.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitrary code execution.

oval:org.secpod.oval:def:42614
The host is installed with Apple Safari before 11.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitrary code execution.

oval:org.secpod.oval:def:42613
The host is installed with Apple Safari before 11.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitrary code execution.

oval:org.secpod.oval:def:42612
The host is installed with Apple Safari before 11.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitrary code execution.

oval:org.secpod.oval:def:42618
The host is missing a security update according to Apple advisory, APPLE-SA-2017-10-31-5. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation allow attackers to perf ...

oval:org.secpod.oval:def:42616
The host is installed with Apple Safari before 11.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitrary code execution.

oval:org.secpod.oval:def:42609
The host is installed with Apple Safari before 11.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitrary code execution.

oval:org.secpod.oval:def:42615
The host is installed with Apple Safari before 11.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitrary code execution.

oval:org.secpod.oval:def:42611
The host is installed with Apple Safari before 11.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitrary code execution.

oval:org.secpod.oval:def:42617
The host is installed with Apple Safari before 11.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitrary code execution.

oval:org.secpod.oval:def:43216
The host is installed with Apple Safari before 11.0.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitrary code execution.

oval:org.secpod.oval:def:43219
The host is missing a security update according to Apple advisory, APPLE-SA-2017-10-31-5. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation allow attackers to perfo ...

oval:org.secpod.oval:def:43218
The host is installed with Apple Safari before 11.0.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitrary code execution.

oval:org.secpod.oval:def:43217
The host is installed with Apple Safari before 11.0.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitrary code execution.

oval:org.secpod.oval:def:43215
The host is installed with Apple Safari before 11.0.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitrary code execution.

oval:org.secpod.oval:def:43214
The host is installed with Apple Safari before 11.0.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted web content. Successful exploitation could allow attackers to lead to arbitrary code execution.

oval:org.secpod.oval:def:21752
The host is installed with Xcode before 7.0 on Apple Mac OS X 10.10.4 or later, Apple Mac OS X or Server 10.8.5 or OS X 10.9 through 10.9.4 or 10.10.x before 10.10.2 and is prone to a man-in-the-middle vulnerability. A flaw is present in the application, which fails to properly handle a padding-orac ...

oval:org.secpod.oval:def:21746
The host is missing a security update according to Apple advisory, APPLE-SA-2014-10-16-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle certain vectors. Successful exploitation allows attackers to determine all the network add ...

oval:org.secpod.oval:def:43628
The host is installed with Apple Mac OS X 10.12.6 or 10.11.6 and is prone to an information disclosure vulnerability. The flaw is present in the application, which fails to properly handle systems with microprocessors utilizing speculative execution and indirect branch prediction. Successful exploit ...

oval:org.secpod.oval:def:43626
The host is installed with Apple Mac OS X 10.13.2 and is prone to a denial of service vulnerability. The flaw is present in the application, which fails to properly handle an out-of-bounds read issue. Successful exploitation allows attackers to cause a denial of service.

oval:org.secpod.oval:def:3007
Th host is installed with Apache HTTP Server 2.2.9 through 2.2.15, 2.3.4-alpha, and 2.3.5-alpha on OS/2 and is prone to a denial of service vulnerability. A flaw is present in certain configurations involving proxy worker pools, which does not properly detect timeouts, which allows remote attackers ...

oval:org.secpod.oval:def:3050
The host is missing an important security update according to, APPLE-SA-2011-03-21-1. The update is required to fix multiple remote code execution vulnerabilities. The flaws are present in the application, which fail to sanitize user supplied input. Successful exploitation could allow attackers to e ...

oval:org.secpod.oval:def:4650
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.289.0, 10.x before 10.1.102.64 or Adobe AIR before 2.0.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful ex ...

oval:org.secpod.oval:def:16067
The host is installed with Google Chrome before 31.0.1650.48, Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2 or SeaMonkey before 2.23 and is prone to an information disclosure vulnerability. The flaw is present in get_sos function in jdmarker.c, which fails to pro ...

oval:org.secpod.oval:def:2217
The host is installed with Google Chrome before 13.0.782.215, Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to a double free vulnerability. A flaw is present in the application, which fails to handle libxml xpath. Successful exploitation could allow attackers to crash the service or cau ...

oval:org.secpod.oval:def:2404
The host is installed with Google Chrome before 14.0.835.163 or Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to double free vulnerability. A flaw is present in the application which fails in XPath handling. Successful exploitation allows remote attackers to cause denial of service or p ...

oval:org.secpod.oval:def:3764
The host is installed with Google Chrome before 16.0.912.75, Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to c ...

oval:org.secpod.oval:def:4246
The host is installed with Google Chrome before 17.0.963.56 or Apple Mac OS X 10.6.8 or OS X 10.7.0 before 10.7.4 and is prone to an integer overflow vulnerability. A flaw is present in the applications, which fail to handle unknown vectors that trigger an integer truncation. Successful exploitation ...

oval:org.secpod.oval:def:2854
The host is installed with Apple Mac OS X 10.5.8 or 10.6 through 10.6.7 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the application, as it fails to handle TIFF images. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

oval:org.secpod.oval:def:2882
The host is installed with Apple iTunes before 10.2 or Apple Safari 5.0.4 or Apple Mac OS X 10.6.0 through 10.6.6 and is prone to buffer overflow vulnerability. A flaw is present in the application which fails to handle a crafted TIFF image with JPEG encoding. Successful exploitation could allow re ...

oval:org.secpod.oval:def:2883
The host is installed with Apple iTunes before 10.2 or Apple Safari 5.0.4 or Apple Mac OS X 10.6.0 through 10.6.6 and is prone to buffer overflow vulnerability. A flaw is present in the application which fails to handle a crafted TIFF Internet Fax image file. Successful exploitation could allow remo ...

oval:org.secpod.oval:def:2885
The host is installed with Apple iTunes before 10.2 or Apple Safari before 5.0.4 or Apple Mac OS X 10.5.8 or 10.6 through 10.6.4 and is prone to buffer overflow vulnerability. A flaw is present in the application which fails to handle a PNG image that triggers an additional data row. Successful expl ...

oval:org.secpod.oval:def:3345
The host is installed with Apple Safari before 4.0.5 or Apple iTunes before 9.1 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to ensure that memory access is associated with initialized memory. Successful exploitation could allow attackers to cr ...

oval:org.secpod.oval:def:3343
The host is installed with Apple Safari before 4.0.5 or Apple iTunes before 9.1 and is prone to an information disclosure vulnerability. A flaw is present in the applications, which fail to ensure that memory access is associated with initialized memory. Successful exploitation could allow attackers ...

oval:org.secpod.oval:def:3344
The host is installed with Apple Safari before 4.0.5 or Apple iTunes before 9.1 and is prone to an information disclosure vulnerability. A flaw is present in the applications, which fail to ensure that memory access is associated with initialized memory. Successful exploitation could allow attackers ...

oval:org.secpod.oval:def:2938
The host is installed with Apple iTunes before 10.2 or Apple Safari 5.0.4 or Apple Mac OS X 10.6.0 through 10.6.6 and is prone to memory leak vulnerability. A flaw is present in the application which fails to handle a crafted International Color Consortium (ICC) profile in a JPEG image. Successful e ...

oval:org.secpod.oval:def:2937
The host is installed with Apple iTunes before 10.2 or Apple Safari 5.0.4 or Apple Mac OS X 10.6.0 through 10.6.4 and is prone to memory leak vulnerability. A flaw is present in the application which fails to handle a PNG image containing malformed Physical Scale (aka sCAL) chunks. Successful exploi ...

oval:org.secpod.oval:def:2675
The host is installed with Google Chrome before 8.0.552.215 or Apple Safari before 5.0.4 or Apple iTunes before 10.2 and is prone to double free vulnerability. A flaw is present in the applications which fail in libxml's handling of XPath expressions. Successful exploitation allows remote attackers ...

oval:org.secpod.oval:def:2678
The host is installed with Google Chrome before 7.0.517.44 or Apple Safari before 5.0.4 and is prone to denial of service vulnerability. A flaw is present in the application which fails to properly handle memory. Successful exploitation allows remote attackers to cause a denial of service (applicati ...

oval:org.secpod.oval:def:3504
The host is installed with Apple Mac OS X 10.5.8 or Apple Mac OS X 10.6 before 10.6.2 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted TIFF image. Successful exploitation could allow attackers to crash the service or execute arbit ...

oval:org.secpod.oval:def:4682
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to handle unspecified vectors. Successful ...

oval:org.secpod.oval:def:4685
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Succe ...

oval:org.secpod.oval:def:4661
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Success ...

oval:org.secpod.oval:def:4668
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to an URL parsing vulnerability. A flaw is present in the application, which fails to handle unspecified vectors related to ...

oval:org.secpod.oval:def:4672
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors, relat ...

oval:org.secpod.oval:def:4670
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Succe ...

oval:org.secpod.oval:def:4675
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Succe ...

oval:org.secpod.oval:def:4678
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a heap based buffer vulnerability. A flaw is present in the application, which fails to sanitize malicious input. Success ...

oval:org.secpod.oval:def:4679
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Succe ...

oval:org.secpod.oval:def:4655
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.280.0, 10.x before 10.1.82.76 or Adobe AIR before 2.0.3and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful expl ...

oval:org.secpod.oval:def:4657
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Flash Player before 9.0.280.0, 10.x before 10.1.82.76 or Adobe AIR before 2.0.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful ...

oval:org.secpod.oval:def:4640
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Adobe Flash Player before 9.0.289.0, 10.x before 10.1.102.64 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow remote a ...

oval:org.secpod.oval:def:4643
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Adobe Flash Player before 9.0.289.0, 10.x before 10.1.102.64 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow remote a ...

oval:org.secpod.oval:def:4641
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Adobe Flash Player before 9.0.289.0, 10.x before 10.1.102.64 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow remote a ...

oval:org.secpod.oval:def:4642
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Adobe Flash Player before 9.0.289.0, 10.x before 10.1.102.64 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow remote a ...

oval:org.secpod.oval:def:4646
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Adobe Flash Player before 9.0.289.0, 10.x before 10.1.102.64 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow remote a ...

oval:org.secpod.oval:def:4632
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Adobe Flash Player before 9.0.289.0, 10.x before 10.1.102.64 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow remote a ...

oval:org.secpod.oval:def:4633
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Adobe Flash Player before 9.0.289.0, 10.x before 10.1.102.64 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow remote a ...

oval:org.secpod.oval:def:4636
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Adobe Flash Player before 9.0.289.0, 10.x before 10.1.102.64 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow remote a ...

oval:org.secpod.oval:def:4634
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Adobe Flash Player before 9.0.289.0, 10.x before 10.1.102.64 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow remote a ...

oval:org.secpod.oval:def:4635
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Adobe Flash Player before 9.0.289.0, 10.x before 10.1.102.64 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow remote a ...

oval:org.secpod.oval:def:4639
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 or Adobe Flash Player before 9.0.289.0, 10.x before 10.1.102.64 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow remote a ...

oval:org.secpod.oval:def:4291
The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to double free vulnerability. A flaw is present in the application, which fails to handle a request associated with (1) renewal or (2) validation. Successful exploitation could allow attackers to execute arbitrary co ...

oval:org.secpod.oval:def:4289
The host is installed with Apple Mac OS X 10.6 before 10.6.4 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to handle invalid (1) AS-REQ or (2) TGS-REQ request. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:4305
The host is missing a security update according to Apple advisory, APPLE-SA-2010-06-15-1 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to handle malicious data. Successful exploitation allows remote attackers to crash the service, execute arbitrary o ...

oval:org.secpod.oval:def:3868
The host is installed with Apple Mac OS X 10.5.8 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly validate package signatures. Successful exploitation could allow attackers allow remote attackers to have unspecified impacts.

oval:org.secpod.oval:def:4651
The host is installed with Apple Mac OS X 10.5.8, 10.6 before 10.6.5 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted Adobe Type 1 Mac Font File. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:3147
The host is installed with Apple Mac OS X 10.6.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle certain floating-point value in scientific notation. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3033
The host is installed with PHP 5.3.x through 5.3.3 and is prone to a format string vulnerability. A flaw is present in the application, which fails to handle a crafted phar:// URI. Successful exploitation could allow attackers to obtain sensitive information.

oval:org.secpod.oval:def:3038
The host is installed with PHP 5.3.3 and earlier and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle an invalid argument. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:3847
The host is installed with Apple Mac OS X before 10.6.3 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly handle crafted unicode string. Successful exploitation could allow remote attackers to inject arbitrary web script or HTML.

oval:org.secpod.oval:def:3867
The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.3 and is prone to an arbitrary command execution vulnerability. A flaw is present in the application, which fails to handle a malicious sequence inserted into a file. Successful exploitation could allow attackers allow remote attac ...

oval:org.secpod.oval:def:3884
The host is missing an update according to Apple advisory, APPLE-SA-2009-08-12-1. The update is required to fix a denial of service vulnerability. A flaw is present in the dns_db_findrdataset function in db.c, which fails to handle maliciously crafted update message. Successful exploitation could al ...

oval:org.secpod.oval:def:4302
The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to a session fixation vulnerability. A flaw is present in the application, which fails to handle a crafted cookie. Successful exploitation could allows remote attackers to hijack web sessions.

oval:org.secpod.oval:def:4303
The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle a crafted message. Successful exploitation allows remote attackers to spoof the user interface.

oval:org.secpod.oval:def:4301
The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to an arbitrary command execution vulnerability. A flaw is present in the application, which fails to handle shell metacharacters in a username string. Successful exploitation could allows remote attackers to execute ...

oval:org.secpod.oval:def:38513
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to curl. Successful exploitation could allow attackers to leak sensitive u ...

oval:org.secpod.oval:def:38800
The host is installed with Apple Mac OS X or Server 10.12.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle certain modeline options. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:44840
The host is installed with Apple Mac OS X 10.11.6 or 10.12.6 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle bounds checking. Successful exploitation leads to integer overflow.

oval:org.secpod.oval:def:44908
The host is installed with Apple Safari before 10.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation may lead to arbitrary code execution.

oval:org.secpod.oval:def:44909
The host is installed with Apple Safari before 10.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation may exfiltrate data cross-origin.

oval:org.secpod.oval:def:44910
The host is installed with Apple Safari before 10.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation may exfiltrate data cross-origin.

oval:org.secpod.oval:def:44916
The host is installed with Apple Safari before 11.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation may lead to arbitrary code execution.

oval:org.secpod.oval:def:38552
The host is installed with Apple Mac OS X or Server 10.11.6 or 10.12.x through 10.12.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to cause a denial of service.

oval:org.secpod.oval:def:38555
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:14174
The host is missing an important security update according to Apple advisory, APPLE-SA-2013-06-04-1. The update is required to fix multiple vulnerabilities. The flaw are present in the application, which fails to handle a crafted application. Successful exploitation could allow attackers to crash th ...

oval:org.secpod.oval:def:14154
The host is installed with OS X Lion 10.7 through 10.7.5, OS X Lion Server 10.7 through 10.7.5, OS X Mountain Lion 10.8 through 10.8.3, Apple Mac OS X Server 10.6.8 or Apple Mac OS X 10.6.8 and is prone to man in the middle attack vulnerability. A flaw is present in the application, which can encryp ...

oval:org.secpod.oval:def:45302
The host is installed with Apple Mac OS X 10.13.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle memory corruption issues with improper error handling. Successful exploitation leads an application to gain elevated privileges ...

oval:org.secpod.oval:def:45303
The host is installed with Apple Mac OS X 10.13.4 and is prone to a UI-spoofing vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted test message. Successful exploitation leads to UI spoofing.

oval:org.secpod.oval:def:45304
The host is missing a security update according to Apple advisory, APPLE-SA-2018-04-24-2. The update is required to fix multiple vulnerabilities. A flaw is present in the application, which fails to properly handle maliciously crafted vectors. Successful exploitation may lead to UI spoofing or memor ...

oval:org.secpod.oval:def:45305
The host is missing a security update according to Apple advisory, APPLE-SA-2018-04-24-3. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to disclose sens ...

oval:org.secpod.oval:def:45306
The host is installed with Apple Safari before 11.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications, which fails to properly handle a memory corruption issue. Successful exploitation may lead to arbitrary code execution.

oval:org.secpod.oval:def:45307
The host is installed with Apple Safari before 11.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications, which fails to properly handle a memory corruption issue. Successful exploitation may lead to arbitrary code execution.

oval:org.secpod.oval:def:39594
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a padding oracle attack vulnerability. A flaw is present in the application, which fails to properly handle mod_session_crypto module. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39595
The host is installed with Apple Mac OS X or Server 10.8 before 10.13 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle LibreSSL. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39597
The host is installed with Apple Mac OS X 10.8 before 10.13 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle crafted CONTINUATION frames in an HTTP/2 request. Successful exploitation could allow attackers to execute arbitrary cod ...

oval:org.secpod.oval:def:39598
The host is installed with Apple Mac OS X 10.8 before 10.13 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:44828
The host is installed with Apple Safari before 11.1 and is prone to a cross-site script vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to a cross-site scripting attack.

oval:org.secpod.oval:def:44829
The host is installed with Apple Safari before 11.1 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fails to properly handle a maliciously crafted web content. Successful exploitation may lead to a denial of service.

oval:org.secpod.oval:def:44845
The host is installed with Apple Mac OS X 10.13.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle memory corruption issues. Successful exploitation allows an application to execute arbitrary code with system privileges.

oval:org.secpod.oval:def:44846
The host is installed with Apple Mac OS X 10.13.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle memory corruption issues. Successful exploitation allows an application to execute arbitrary code with kernel privileges.

oval:org.secpod.oval:def:44847
The host is installed with Apple Mac OS X 10.13.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle memory corruption issues. Successful exploitation allows an application to execute arbitrary code with kernel privileges.

oval:org.secpod.oval:def:44848
The host is installed with Apple Mac OS X 10.11.6 or 10.12.6 or 10.13.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle improper validation. Successful exploitation allows an application to read restricted memory.

oval:org.secpod.oval:def:44843
The host is installed with Apple Mac OS X 10.13.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle improper validation. Successful exploitation allows an application to gain elevated privileges.

oval:org.secpod.oval:def:44844
The host is installed with Apple Mac OS X 10.11.6 or 10.12.6 or 10.13.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle improper validation. Successful exploitation allows an application to gain elevated privileges.

oval:org.secpod.oval:def:44849
The host is installed with Apple Mac OS X 10.13.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle memory corruption issues. Successful exploitation allows an application to execute arbitrary code with kernel privileges.

oval:org.secpod.oval:def:44856
The host is installed with Apple Mac OS X 10.13.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle improper validation. Successful exploitation allows an application to gain elevated privileges.

oval:org.secpod.oval:def:44857
The host is installed with Apple Mac OS X 10.13.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle improper validation. Successful exploitation allows an application to gain elevated privileges.

oval:org.secpod.oval:def:44858
The host is installed with Apple Mac OS X 10.13.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly input validation issues. Successful exploitation allows an application to read restricted memory.

oval:org.secpod.oval:def:44852
The host is installed with Apple Mac OS X 10.11.6 or 10.12.6 or 10.13.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted applications. Successful exploitation allows an application to bypass code signing en ...

oval:org.secpod.oval:def:44860
The host is installed with Apple Mac OS X 10.11.6 or 10.12.6 or 10.13.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle improper validation. Successful exploitation allows an application to read restricted memory.

oval:org.secpod.oval:def:44861
The host is installed with Apple Mac OS X 10.13.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle improper validation. Successful exploitation allows an application to gain elevated privileges.

oval:org.secpod.oval:def:44862
The host is installed with Apple Mac OS X 10.11.6 or 10.12.6 or 10.13.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle improper validation. Successful exploitation allows an application to elevate privileges.

oval:org.secpod.oval:def:44863
The host is installed with Apple Mac OS X 10.11.6 or 10.12.6 or 10.13.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle improper validation. Successful exploitation allows an application to read restricted memory.

oval:org.secpod.oval:def:44864
The host is installed with Apple Mac OS X 10.13.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an issue in CFPreferences. Successful exploitation allows an application to read restricted memory.

oval:org.secpod.oval:def:44809
The host is installed with Apple Safari before 11.1 and is prone to an address bar spoofing vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to address bar spoofing.

oval:org.secpod.oval:def:44808
The host is installed with Apple Safari before 11.1 and is prone to an address bar spoofing vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to address bar spoofing.

oval:org.secpod.oval:def:44812
The host is installed with Apple Safari before 11.1 and is prone to a memory corrpution vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to arbitrary code execution.

oval:org.secpod.oval:def:44813
The host is installed with Apple Safari before 11.1 and is prone to a memory corrpution vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to arbitrary code execution.

oval:org.secpod.oval:def:44814
The host is installed with Apple Safari before 11.1 and is prone to a memory corrpution vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to arbitrary code execution.

oval:org.secpod.oval:def:44815
The host is installed with Apple Safari before 11.1 and is prone to a memory corrpution vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to arbitrary code execution.

oval:org.secpod.oval:def:44811
The host is installed with Apple Safari before 11.1 and is prone to a memory corrupution vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to arbitrary code execution.

oval:org.secpod.oval:def:44816
The host is installed with Apple Safari before 11.1 and is prone to a memory corrpution vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to arbitrary code execution.

oval:org.secpod.oval:def:44817
The host is installed with Apple Safari before 11.1 and is prone to a memory corrpution vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to arbitrary code execution.

oval:org.secpod.oval:def:44818
The host is installed with Apple Safari before 11.1 and is prone to a memory corrpution vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to arbitrary code execution.

oval:org.secpod.oval:def:44819
The host is installed with Apple Safari before 11.1 and is prone to a memory corrpution vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to arbitrary code execution.

oval:org.secpod.oval:def:44823
The host is installed with Apple Safari before 11.1 and is prone to a memory corrpution vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to arbitrary code execution.

oval:org.secpod.oval:def:44824
The host is installed with Apple Safari before 11.1 and is prone to a memory corrpution vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to arbitrary code execution.

oval:org.secpod.oval:def:44825
The host is installed with Apple Safari before 11.1 and is prone to a memory corrpution vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to arbitrary code execution.

oval:org.secpod.oval:def:44826
The host is installed with Apple Safari before 11.1 and is prone to a memory corrpution vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to arbitrary code execution.

oval:org.secpod.oval:def:44820
The host is installed with Apple Safari before 11.1 and is prone to a memory corrpution vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to arbitrary code execution.

oval:org.secpod.oval:def:44821
The host is installed with Apple Safari before 11.1 and is prone to a memory corrpution vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to arbitrary code execution.

oval:org.secpod.oval:def:44822
The host is installed with Apple Safari before 11.1 and is prone to a memory corrpution vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may lead to arbitrary code execution.

oval:org.secpod.oval:def:44827
The host is installed with Apple Safari before 11.1 and is prone to an unspecified vulnerability. An array indexing issue existed in the handling of a function in javascript core. Successful exploitation may lead to an ASSERT failure.

oval:org.secpod.oval:def:44835
The host is installed with Apple Mac OS X 10.11.6 or 10.12.6 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle improper validation. Successful exploitation allows an application to gain elevated privileges.

oval:org.secpod.oval:def:44836
The host is installed with Apple Mac OS X 10.11.6 or 10.12.6 or 10.13.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle improper validation. Successful exploitation allows an application to gain elevated privileges.

oval:org.secpod.oval:def:44837
The host is installed with Apple Mac OS X 10.11.6 or 10.12.6 or 10.13.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle improper validation. Successful exploitation allows an application to gain elevated privileges.

oval:org.secpod.oval:def:44830
The host is installed with Apple Safari before 11.1 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fails to properly handle a maliciously crafted web content. Successful exploitation may lead to a denial of service.

oval:org.secpod.oval:def:44833
The host is installed with Apple Mac OS X 10.11.6, 10.12.6 or 10.13.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted files in symlinks. Successful exploitation allows attackers to disclose user informa ...

oval:org.secpod.oval:def:44838
The host is installed with Apple Mac OS X 10.13.3 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted strings. Successful exploitation leads to denial of service.

oval:org.secpod.oval:def:43633
The host is installed with Apple Mac OS X 10.13.2 and is prone to an information disclosure vulnerability. The flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an application to read restricted memory.

oval:org.secpod.oval:def:43632
The host is installed with Apple Mac OS X 10.13.2 or 10.12.6 and is prone to an arbitrary code execution vulnerability. The flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allows an application to execute an arbitrary code with kernel privile ...

oval:org.secpod.oval:def:43631
The host is installed with Apple Mac OS X 10.13.2 or 10.12.6 or 10.11.6 and is prone to an arbitrary code execution vulnerability. The flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an application to execute an arbitrary c ...

oval:org.secpod.oval:def:43638
The host is installed with Apple Mac OS X 10.13.2 or 10.12.6 or 10.11.6 and is prone to an information disclosure vulnerability. The flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to read restricted memory.

oval:org.secpod.oval:def:43635
The host is installed with Apple Mac OS X 10.13.2 or 10.12.6 or 10.11.6 and is prone to an arbitrary code execution vulnerability. The flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to perform an arbitrary code ...

oval:org.secpod.oval:def:43623
The host is installed with Apple Safari before 11.0.3 or Apple Mac OS X 10.13.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications, which fails to properly handle crafted web content. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:43622
The host is installed with Apple Safari before 11.0.3 or Apple Mac OS X 10.13.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications, which fails to properly handle crafted web content. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:43621
The host is installed with Apple Safari before 11.0.3 or Apple Mac OS X 10.13.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications, which fails to properly handle crafted web content. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:43627
The host is installed with Apple Mac OS X 10.13.2 or 10.12.6 or 10.11.6 and is prone to an arbitrary code execution vulnerability. The flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows attackers to execute an arbitrary code w ...

oval:org.secpod.oval:def:43624
The host is missing a security update for Apple advisory, APPLE-SA-2018-1-23-5. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fails to properly handle crafted web content. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:43629
The host is installed with Apple Mac OS X 10.13.2 and is prone to an information disclosure vulnerability. The flaw is present in the application, which fails to properly handle a memory initialization issue. Successful exploitation allows an application to read restricted memory.

oval:org.secpod.oval:def:44913
The host is installed with Apple Safari before 10.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation may lead to arbitrary code execution.

oval:org.secpod.oval:def:44914
The host is installed with Apple Safari before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation may lead to unexpected application termination or arbitrary c ...

oval:org.secpod.oval:def:44918
The host is installed with Apple Safari before 11.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation may lead to arbitrary code execution.

oval:org.secpod.oval:def:39599
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle crafted EXIF data. Successful exploitation could allow attackers to divide the minimum representable negative integer by ...

oval:org.secpod.oval:def:39600
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle a truncated manifest entry in a PHAR archive. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:39601
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an off-by-one error vulnerability. A flaw is present in the application, which fails to properly handle a crafted PHAR archive with an alias mismatch. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39602
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted serialized data. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:38492
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle apache_mod_php. Successful exploitation may cause an unexpected application termination or arbit ...

oval:org.secpod.oval:def:38493
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle apache_mod_php. Successful exploitation may cause an unexpected application termination or arbit ...

oval:org.secpod.oval:def:38494
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle apache_mod_php. Successful exploitation may cause an unexpected application termination or arbit ...

oval:org.secpod.oval:def:38497
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle apache_mod_php. Successful exploitation may cause an unexpected application termination or arbit ...

oval:org.secpod.oval:def:38495
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle apache_mod_php. Successful exploitation may cause an unexpected application termination or arbit ...

oval:org.secpod.oval:def:38496
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle apache_mod_php. Successful exploitation may cause an unexpected application termination or arbit ...

oval:org.secpod.oval:def:38489
The host is missing a critical security update according to Apple advisory, APPLE-SA-2016-12-13-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute a ...

oval:org.secpod.oval:def:39603
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an empty boolean element. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:38791
The host is installed with Apple Mac OS X or Server 10.12.2 and is prone to a stack overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted imagefilltoborder call that triggers use of a negative color value. Successful exploitation could allow attackers ...

oval:org.secpod.oval:def:38792
The host is installed with Apple Mac OS X or Server 10.12.2 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle a crafted serialized data in a wddxPacket XML document. Successful exploitation could allow attackers to crash th ...

oval:org.secpod.oval:def:38789
The host is missing a security update according to Apple advisory, APPLE-SA-2017-01-23-2. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary ...

oval:org.secpod.oval:def:44915
The host is installed with Apple Safari before 11.0.2 and is prone to an user interface spoofing vulnerability. A flaw is present in the application, which fails to properly handle malicious website. Successful exploitation may lead to user interface spoofing.

oval:org.secpod.oval:def:4729
The host is missing a critical security update according to Apple advisory, APPLE-SA-2010-11-10-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly sanitize user supplied input. Successful exploitation could allow attackers to ...

oval:org.secpod.oval:def:4727
The host is installed with Adobe Flash Player before 9.0.277.0 or 10.x before 10.1.53.64, Adobe AIR before 2.0.2.12610, and Adobe Reader 9.x before 9.3.3, and 8.x before 8.2.3 and is prone to a remote code execution vulnerability. A flaw is present in the applications, which fail to handle crafted S ...

oval:org.secpod.oval:def:44841
The host is installed with Apple Mac OS X 10.11.6 or 10.12.6 or 10.13.3 and is prone to an access control vulnerability. A flaw is present in the application, which fails to properly a mounted malicious disk image. Successful exploitation allows an application to launch an application.

oval:org.secpod.oval:def:44842
The host is installed with Apple Mac OS X 10.13.3 and is prone to an arbitrary code injection vulnerability. A flaw is present in the application, which fails to properly handle APFS volume passwords. Successful exploitation leads to an arbitrary code injection through truncation of APFS volume pass ...

oval:org.secpod.oval:def:44850
The host is installed with Apple Mac OS X 10.11.6 or 10.12.6 or 10.13.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle out-of-bounds read. Successful exploitation allows an application execute arbitrary code with kernel pri ...

oval:org.secpod.oval:def:44851
The host is installed with Apple Mac OS X 10.13.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle out-of-bounds read issues. Successful exploitation allows an application to execute arbitrary code with system privileges.

oval:org.secpod.oval:def:44859
The host is installed with Apple Mac OS X 10.13.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly input validation issues. Successful exploitation allows an application to read restricted memory.

oval:org.secpod.oval:def:44853
The host is installed with Apple Mac OS X 10.11.6 or 10.12.6 or 10.13.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle out-of-bounds read. Successful exploitation allows an application execute arbitrary code with system pri ...

oval:org.secpod.oval:def:44854
The host is installed with Apple Mac OS X 10.13.3 and is prone to an improper certificate validation vulnerability. A flaw is present in the application, which fails to properly handle S/MIME-encrypted HTML e-mail. Successful exploitation allows an application to exfiltrate the contents of S/MIME-en ...

oval:org.secpod.oval:def:44855
The host is installed with Apple Mac OS X 10.13.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle inconsistent user-interface. Successful exploitation allows an application to intercept the contents of S/MIME-encrypted e-m ...

oval:org.secpod.oval:def:44867
The host is installed with Apple Mac OS 10.13.3 or 10.12.6 or 10.11.6 and is prone to multiple vulnerabilities. The flaw is present in the application, which fails to properly handle multiple issues. Successful exploitation allows remote attackers to execute arbitrary code or read restricted memory.

oval:org.secpod.oval:def:44865
The host is installed with Apple Mac OS X 10.11.6 or 10.12.6 or 10.13.3 and is prone to an arbitrary code injection vulnerability. A flaw is present in the application, which fails to properly handle bracketed paste mode. Successful exploitation allows an application to execute arbitrary command exe ...

oval:org.secpod.oval:def:44866
The host is installed with Apple Mac OS X 10.13.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle keystrokes entered by unprivileged applications. Successful exploitation allows an application to read restricted memory.

oval:org.secpod.oval:def:44810
The host is installed with Apple Safari before 11.1 and is prone to an information disclosure vulnerability. A flaw is present in the applications, which fails to properly handle a malicious website. Successful exploitation may be able to exfiltrate autofilled data in Safari without explicit user in ...

oval:org.secpod.oval:def:44834
The host is installed with Apple Mac OS X 10.13.3 and is prone to an arbitrary code injection vulnerability. A flaw is present in the application, which fails to properly handle APFS volume passwords. Successful exploitation leads to an arbitrary code injection through truncation of APFS volume pass ...

oval:org.secpod.oval:def:44831
The host is missing a security update according to Apple advisory, APPLE-SA-2018-3-29-6. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to disclose sensi ...

oval:org.secpod.oval:def:44832
The host is installed with Apple Mac OS X 10.13.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle passwords passed to sysadminctl tool. Successful exploitation leads to the exposure of passwords to other local users.

oval:org.secpod.oval:def:43634
The host is installed with Apple Mac OS X 10.13.2 or 10.12.6 and is prone to a denial of service vulnerability. The flaw is present in the application, which fails to properly handle a resource exhaustion issue. Successful exploitation allows an application to cause denial of service.

oval:org.secpod.oval:def:43637
The host is installed with Apple Mac OS X 10.13.2 or 10.12.6 and is prone to a privilege escalation vulnerability. The flaw is present in the application, which fails to properly handle a certificate evaluation issue. Successful exploitation makes a certificate to have name constraints applied incor ...

oval:org.secpod.oval:def:43636
The host is installed with Apple Mac OS X 10.13.2 and is prone to an unspecified vulnerability. The flaw is present in the application, which fails to properly handle an access issue. Successful exploitation allows a sandboxed process to circumvent sandbox restrictions.

oval:org.secpod.oval:def:43639
The host is installed with Apple Mac OS 10.13.1 or 10.12.6 or 10.11.6 and is prone to multiple vulnerabilities. The flaw is present in the application, which fails to properly handle multiple issues. Successful exploitation allows remote attackers to execute arbitrary code or read restricted memory.

oval:org.secpod.oval:def:43625
The host is installed with Apple Mac OS X 10.13.2 or 10.12.6 and is prone to a remote code execution vulnerability. The flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows attackers to execute an arbitrary code by processing a ...

oval:org.secpod.oval:def:43630
The host is installed with Apple Mac OS X 10.13.2 and is prone to an information disclosure vulnerability. The flaw is present in the application, which fails to properly handle a race condition issue. Successful exploitation allows an application to read restricted memory.

oval:org.secpod.oval:def:44839
The host is installed with Apple Mac OS X 10.11.6 or 10.12.6 and is prone to an information access vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted webpages. Successful exploitation allows an application to mount a disk image.

oval:org.secpod.oval:def:44911
The host is installed with Apple Safari before 10.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation may exfiltrate data cross-origin.

oval:org.secpod.oval:def:44912
The host is installed with Apple Safari before 10.1 and is prone to an universal cross site script vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted web page. Successful exploitation may lead to universal cross site scripting.

oval:org.secpod.oval:def:44917
The host is installed with Apple Safari before 11.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation may lead to arbitrary code execution.

oval:org.secpod.oval:def:44096
The host is installed with Apple Mac OS X 10.13.3 and is prone to a memory corruption vulnerability. The flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker processing a maliciously crafted string to lead to heap co ...

oval:org.secpod.oval:def:44097
The host is missing a security update according to Apple advisory, APPLE-SA-2018-02-19-2. The update is required to fix memory corruption vulnerability. The flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation could allow attackers pro ...

oval:org.secpod.oval:def:39617
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle bounds checking. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:39718
The host is missing a security update according to Apple advisory, APPLE-SA-2017-03-27-3. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary ...

CVE    67
CVE-1999-0524
CVE-2016-1208
CVE-2016-1941
CVE-2010-2530
...
*CPE
cpe:/o:apple:mac_os_x

© 2013 SecPod Technologies