Download
| Alert*
oval:org.secpod.oval:def:67566
Apple Mac OS 11 is installed oval:org.secpod.oval:def:68537 The host is installed with Xcode before 12.4 on Apple Mac OS X 10.15.4 or later and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to access arbitrary files on th ... oval:org.secpod.oval:def:68538 The host is missing a security update according to the Apple advisory APPLE-SA-2021-01-26-4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to access arbitrary ... oval:org.secpod.oval:def:75129 The host is installed with Xcode before 13 on Apple Mac OS 11.3 or later and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issue in nginx. Successful exploitation allows an attacker to cause a denial of service via a crafted DNS r ... oval:org.secpod.oval:def:75128 The host is installed with Xcode before 13 on Apple Mac OS 11.3 or later and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issue in nginx. Successful exploitation allows an attacker to cause a denial of service via a crafted UDP D ... oval:org.secpod.oval:def:75130 The host is installed with Xcode before 13 on Apple Mac OS 11.3 or later and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issue in nginx. Successful exploitation allows an attacker to cause a denial of service via vectors related ... oval:org.secpod.oval:def:80329 Remote login service _MUST_ be configured to display a policy banner at login. Displaying a standardized and approved use notification before granting access to the operating system ensures that users are provided with privacy and security notification verbiage that is consistent with applicable f ... oval:org.secpod.oval:def:74158 The host is installed with Apple Mac OS 11.5, Mac OS X 10.14.6 or 10.15.7 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle input validation issue. On successful exploitation, processing a maliciously crafted font file may lead to ... oval:org.secpod.oval:def:74159 The host is installed with Apple Mac OS 11.5, Mac OS X 10.14.6 or 10.15.7 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle input validation issue. On successful exploitation, an application may be able to execute arbitrary cod ... oval:org.secpod.oval:def:74157 The host is installed with Apple Mac OS 11.5, Mac OS X 10.14.6 or 10.15.7 and is prone to an stack overflow vulnerability. A flaw is present in the application, which fails to properly handle input validation issue. On successful exploitation, processing a maliciously crafted font file may lead to a ... oval:org.secpod.oval:def:74165 The host is installed with Apple Mac OS 11.5 or Mac OS X 10.15.7 and is prone to an logic vulnerability. A flaw is present in the application, which fails to properly handle validation issue. On successful exploitation, playing a malicious audio file may lead to an unexpected application termination ... oval:org.secpod.oval:def:74166 The host is installed with Apple Mac OS 11.5, Mac OS X 10.14.6 or 10.15.7 and is prone to an injection vulnerability. A flaw is present in the application, which fails to properly handle validation issue. On successful exploitation, a malicious application may be able to gain root privileges. oval:org.secpod.oval:def:74163 The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 11.5 and is prone to an logic vulnerability. A flaw is present in the application, which fails to properly handle validation issue. On successful exploitation, a malicious application may be able to gain root privileges. oval:org.secpod.oval:def:74164 The host is installed with Apple Mac OS 11.5 or Mac OS X 10.15.7 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle state management issue. On successful exploitation, processing a maliciously crafted audio file may lead to arbitra ... oval:org.secpod.oval:def:74161 The host is installed with Apple Mac OS 11.5 or Mac OS X 10.15.7 and is prone to an logic vulnerability. A flaw is present in the application, which fails to properly handle validation issue. On successful exploitation, a sandboxed process may be able to circumvent sandbox restrictions. oval:org.secpod.oval:def:74162 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.5 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle checks issue. On successful exploitation, a malicious application may be able to gain root privil ... oval:org.secpod.oval:def:74160 The host is installed with Apple Mac OS 11.5, Mac OS X 10.14.6 or 10.15.7 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle input validation issue. On successful exploitation, an application may be able to execute arbitrary cod ... oval:org.secpod.oval:def:74155 The host is installed with Apple Mac OS 11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle state management issue. On successful exploitation, an application may be able to execute arbitrary code with kernel privileges. oval:org.secpod.oval:def:74178 The host is installed with Apple Mac OS 11.5 or Mac OS X 10.15.7 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle input validation issue. On successful exploitation, processing a maliciously crafted font file may lead to arbitr ... oval:org.secpod.oval:def:74179 The host is installed with Apple Mac OS 11.5, Mac OS X 10.14.6 or 10.15.7 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle issue. On successful exploitation, opening a maliciously crafted file may lead to unexpected applica ... oval:org.secpod.oval:def:74188 The host is installed with Apple Mac OS 11.5 and is prone to an permissions vulnerability. A flaw is present in the application, which fails to properly handle validation issue. On successful exploitation, a malicious application may be able to access a user\xe2\x80\x99s recent contacts. oval:org.secpod.oval:def:74186 The host is installed with Apple Mac OS 11.5 and is prone to an logic vulnerability. A flaw is present in the application, which fails to properly handle state management issue. On successful exploitation, a malicious application may be able to bypass certain privacy preferences. oval:org.secpod.oval:def:74184 The host is installed with Apple Mac OS 11.5, Mac OS X 10.14.6 or 10.15.7 and is prone to an logic vulnerability. A flaw is present in the application, which fails to properly handle validation issue. On successful exploitation, processing a maliciously crafted image may lead to a denial of service. oval:org.secpod.oval:def:74181 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.5 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle input validation issue. On successful exploitation, processing a maliciously crafted image may le ... oval:org.secpod.oval:def:74182 The host is installed with Apple Mac OS 11.5, Mac OS X 10.14.6 or 10.15.7 and is prone to an logic vulnerability. A flaw is present in the application, which fails to properly handle state management issue. On successful exploitation, an application may be able to execute arbitrary code with kernel ... oval:org.secpod.oval:def:74180 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.5 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle bounds checking issue. On successful exploitation, processing a maliciously crafted file may discl ... oval:org.secpod.oval:def:74169 The host is installed with Apple Mac OS 11.5, Mac OS X 10.14.6 or 10.15.7 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle bounds checking issue. On successful exploitation, a malicious application may be able to gain root pri ... oval:org.secpod.oval:def:74167 The host is installed with Apple Mac OS 11.5 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle entitlements issue. On successful exploitation, a malicious application may be able to bypass privacy preferences. oval:org.secpod.oval:def:74168 The host is installed with Apple Mac OS 11.5 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle checks issue. On successful exploitation, processing a maliciously crafted image may lead to arbitrary code execution. oval:org.secpod.oval:def:74176 The host is installed with Apple Mac OS 11.5, Mac OS X 10.14.6 or 10.15.7 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle checks issue. On successful exploitation, an application may be able to cause unexpected system termina ... oval:org.secpod.oval:def:74177 The host is installed with Apple Mac OS 11.5, Mac OS X 10.14.6 or 10.15.7 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle checks issue. On successful exploitation, processing a maliciously crafted tiff file may lead to a deni ... oval:org.secpod.oval:def:74174 The host is installed with Apple Mac OS 11.5 or Mac OS X 10.15.7 and is prone to an buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle bounds checking issue. On successful exploitation, processing a maliciously crafted image may lead to arbitrary code ... oval:org.secpod.oval:def:74175 The host is installed with Apple Mac OS 11.5 and is prone to an race condition vulnerability. A flaw is present in the application, which fails to properly handle state handling issue. On successful exploitation, opening a maliciously crafted pdf file may lead to an unexpected application terminatio ... oval:org.secpod.oval:def:74173 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.5 and is prone to an multiple vulnerability. A flaw is present in the application, which fails to properly handle logic issue. On successful exploitation, a local attacker may be able to execute code on the apple t2 securi ... oval:org.secpod.oval:def:74170 The host is installed with Apple Mac OS 11.5, Mac OS X 10.14.6 or 10.15.7 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle checks issue. On successful exploitation, a local attacker may be able to cause unexpected applica ... oval:org.secpod.oval:def:74171 The host is installed with Apple Mac OS 11.5, Mac OS X 10.14.6 or 10.15.7 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle checks issue. On successful exploitation, a malicious application may be able to access restricted file ... oval:org.secpod.oval:def:74189 The host is installed with Apple Mac OS 11.5, Mac OS X 10.14.6 or 10.15.7 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle input validation issue. On successful exploitation, an application may be able to execute arbitrary code w ... oval:org.secpod.oval:def:86313 System logs should only be readable by root or admin users. System logs frequently contain sensitive information that could be used by an attacker. Setting the correct permissions mitigates this risk. oval:org.secpod.oval:def:71660 Secure Keyboard Entry prevents other applications on the system and/or network from detecting and recording what is typed into Terminal. Enabling this feature can minimize the risk of a key logger identifying the keys entered into the Terminal oval:org.secpod.oval:def:71683 Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. One method of minimizing this risk is to use complex passwords and periodically change them. If the operating system does not limit the lifetime of passwords and force users to chang ... oval:org.secpod.oval:def:71687 The owner of the audit logs must be root or as appropriate. oval:org.secpod.oval:def:71700 The Application Firewall is the built in firewall that comes with Mac OS X and must be enabled. Firewalls protect computers from network attacks by blocking or limiting access to open network ports. Application firewalls limit which applications are allowed to communicate over the network. oval:org.secpod.oval:def:71705 The owner of bash 'init' files must be root. /etc/profile it is used to set system wide environmental variables on users shells. /etc/bashrc file is meant for setting command aliases and functions used by bash shell users. Use chown root /etc/bashrc /etc/profile to to change the owner as appropriate ... oval:org.secpod.oval:def:71679 When automatic logins are enabled, the default user account is automatically logged in at boot time without prompting the user for a password. Even if the screen is later locked, a malicious user would be able to reboot the computer in order to log in. Disabling automatic logins mitigates this risk. oval:org.secpod.oval:def:80380 Display of a standardized and approved use notification before granting access to the operating system ensures privacy and security notification verbiage used is consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance. System use notifica ... oval:org.secpod.oval:def:80381 Unapproved mechanisms for authentication to the cryptographic module are not verified, and therefore cannot be relied upon to provide confidentiality or integrity, resulting in the compromise of DoD data. Operating systems using encryption are required to use FIPS-compliant mechanisms for authentica ... oval:org.secpod.oval:def:80379 Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the correct time a particular event occurred on a system is critical when conducting forensic analysis and investigating system events. Sources outside of the configured acceptable a ... oval:org.secpod.oval:def:80373 The SSH idle timeout interval should be set to an appropriate value. oval:org.secpod.oval:def:80374 Audit records should never be changed except by the system daemon posting events. Records may be viewed or extracts manipulated but the authoritative files should be protected from unauthorized changes. oval:org.secpod.oval:def:80371 It is important that a system has the newest updates downloaded so that they can be applied. oval:org.secpod.oval:def:80372 Enabling Show Bluetooth status in menu bar is a security awareness method that helps understand the current state of Bluetooth, including whether it is enabled, Discoverable, what paired devices exist and are currently active. oval:org.secpod.oval:def:80377 Library Validation protects processes from loading arbitrary libraries, root from becoming more powerful. Running without Library Validation on a production system runs the risk of the modification of system binaries or code injection of system processes that would otherwise be protected by Library ... oval:org.secpod.oval:def:80378 A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the information system but does not want to log out because of the temporary nature of the absence. The session lock is implemented at the point where session activity can be dete ... oval:org.secpod.oval:def:80375 Enabling Show Wi-Fi status in menu bar is a security awareness method that helps mitigate public area wireless exploits by making the user aware of their wireless connectivity status. oval:org.secpod.oval:def:80376 The SSH idle timeout interval should be set to an appropriate value. oval:org.secpod.oval:def:80370 The SSH ClientAliveCountMax should be set to an appropriate value (and dependencies are met) oval:org.secpod.oval:def:80368 Remote access sessions _MUST_ use encrypted methods to protect unauthorized individuals from gaining access. oval:org.secpod.oval:def:80369 Ensure only strong MAC algorithms are used oval:org.secpod.oval:def:80362 Hot Corners can be configured to disable the screen saver by moving the mouse cursor to a corner of the screen. Setting a hot corner to disable the screen saver poses a potential security risk since an unauthorized person could use this to bypass the login screen and gain access to the system. oval:org.secpod.oval:def:80363 Disabling Internet Sharing reduces the remote attack surface of the system. Internet sharing allows the computer to function as a router and other computers to use it for access. This can expose both the computer itself and the networks it is accessing to unacceptable access from unapproved devices. oval:org.secpod.oval:def:80360 The macOS _MUST_ be configured to require at least one lower-case character and one upper-case character, when a password is created. This rule enforces password complexity by requiring users to set passwords that are less vulnerable to malicious users. oval:org.secpod.oval:def:80361 The main use case for Mac computers is as mobile user endpoints. P2P sharing services should not be enabled on laptops that are using untrusted networks. Content Caching can allow a computer to be a server for local nodes on an untrusted network. While there are certainly logical controls that could ... oval:org.secpod.oval:def:80366 If the system does not require Remote Apple Events, support for Apple Remote Events is non-essential and _MUST_ be disabled. The information system _MUST_ be configured to provide only essential capabilities. Disabling Remote Apple Events helps prevent the unauthorized connection of devices, the una ... oval:org.secpod.oval:def:80367 Setting an inactivity interval for the screensaver prevents unauthorized persons from viewing a system left unattended for an extensive period of time. oval:org.secpod.oval:def:80364 Location Services _MUST_ be disabled. The information system _MUST_ be configured to provide only essential capabilities. Disabling Location Services helps prevent the unauthorized connection of devices, unauthorized transfer of information, and unauthorized tunneling. oval:org.secpod.oval:def:80365 Organizations should manage user privacy settings on managed devices to align with organizational policies and user data protection requirements. Uses will see generic advertising rather than targeted advertising. Apple warns that this will reduce the number of relevant ads. Personalized Ads should ... oval:org.secpod.oval:def:80384 The audit service should shut down the computer if it is unable to audit system events. Once audit failure occurs, user and system activity is no longer recorded and malicious activity could go undetected. Audit processing failures include software/hardware errors, failures in the audit capturing me ... oval:org.secpod.oval:def:80385 It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessary capabilities or services are often overlooked and therefore may remain unsecured. They increase the risk to the platform by providing additional at ... oval:org.secpod.oval:def:80382 Without establishing what type of events occurred, when they occurred, and by whom it would be difficult to establish, correlate, and investigate the events leading up to an outage or attack. Audit record content that may be necessary to satisfy this requirement includes, for example, time stamps, s ... oval:org.secpod.oval:def:80383 The macOS system must enforce the limit of time for failed login reset after the account locked out by providing invalid logon attempts by the user. oval:org.secpod.oval:def:80388 The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. Without configuring a local cache of revocation data, there is the potential to allow access to users who are no longer authorized (users with revoked certificates). Untrusted Certificate Authorities ... oval:org.secpod.oval:def:80389 External writeable media devices must be disabled for users. External USB devices are a potential vector for malware and can be used to exfiltrate sensitive data if an approved data-loss prevention (DLP) solution is not installed. oval:org.secpod.oval:def:80386 Any changes to the hardware, software, and/or firmware components of the information system and/or application can potentially have significant effects on the overall security of the system. Accordingly, software defined by the organization as critical must be signed with a certificate that is recog ... oval:org.secpod.oval:def:80387 Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity or strength is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password complexity is one factor in determining how long ... oval:org.secpod.oval:def:80337 Audit log Folders _MUST_ have the group set to wheel. The audit service _MUST_ be configured to create log files with the correct group ownership to prevent normal users from reading audit logs. Audit logs contain sensitive data about the system and users. If log files are set to be readable and wri ... oval:org.secpod.oval:def:80338 Audit log folders _MUST_ be owned by root. The audit service _MUST_ be configured to create log files with the correct ownership to prevent normal users from reading audit logs. Audit logs contain sensitive data about the system and users. If log files are set to only be readable and writable by sys ... oval:org.secpod.oval:def:80335 Audit log files _MUST_ be owned by root. The audit service _MUST_ be configured to create log files with the correct ownership to prevent normal users from reading audit logs. Audit logs contain sensitive data about the system and users. If log files are set to only be readable and writable by syste ... oval:org.secpod.oval:def:80336 The audit system _MUST_ be configured to record enforcement actions of access restrictions, including failed program execute (-ex) attempts. oval:org.secpod.oval:def:80339 The audit log folder _MUST_ be configured to mode 700 or less permissive so that only the root user is able to read, write, and execute changes to folders. Because audit logs contain sensitive data about the system and users, the audit service _MUST_ be configured to mode 700 or less permissive; the ... oval:org.secpod.oval:def:80330 Ensure only strong MAC algorithms are used oval:org.secpod.oval:def:80333 Audit log files _MUST_ have the group set to wheel. The audit service _MUST_ be configured to create log files with the correct group ownership to prevent normal users from reading audit logs. Audit logs contain sensitive data about the system and users. If log files are set to be readable and writa ... oval:org.secpod.oval:def:80334 The audit service _MUST_ be configured to create log files that are readable only by the root user and group wheel. To achieve this, audit log files _MUST_ be configured to mode 440 or less permissive; thereby preventing normal users from reading, modifying or deleting audit logs. oval:org.secpod.oval:def:80331 The ability to log in to another users active or locked session _MUST_ be disabled. macOS has a privilege that can be granted to any user that will allow that user to unlock active users sessions. Disabling the admins and/or users ability to log into another users active and locked session prevent ... oval:org.secpod.oval:def:80332 Limit the ciphers to those which are FIPS-approved and only use ciphers in counter (CTR) mode. oval:org.secpod.oval:def:80327 The audit log files _MUST_ not contain access control lists (ACLs). This rule ensures that audit information and audit files are configured to be readable and writable only by system administrators, thereby preventing unauthorized access, modification, and deletion of files. oval:org.secpod.oval:def:80328 The audit log folder _MUST_ not contain access control lists (ACLs). Audit logs contain sensitive data about the system and users. This rule ensures that the audit service is configured to create log folders that are readable and writable only by system administrators in order to prevent normal use ... oval:org.secpod.oval:def:80359 Over time passwords can be captured by third parties through mistakes, phishing attacks, third party breaches or merely brute force attacks. To reduce the risk of exposure and to decrease the incentives of password reuse, users must reset passwords periodically. oval:org.secpod.oval:def:80357 The macOS _MUST_ be configured to disable accounts after 35 days of inactivity. This rule prevents malicious users from making use of unused accounts to gain access to the system while avoiding detection. oval:org.secpod.oval:def:80358 The account lockout threshold specifies the amount of times a user can enter an incorrect password before a lockout will occur. Ensure that a lockout threshold is part of the password policy on the computer. The account lockout feature mitigates brute-force password attacks on the system. The macOS ... oval:org.secpod.oval:def:80351 SSH _MUST_ be configured with an Active Server Alive Maximum Count set to 900 or less. Setting the Active Server Alive Maximum Count to 900 second will log users out after a 15-minute interval of inactivity. oval:org.secpod.oval:def:80352 Limit the ciphers to those which are FIPS-approved and only use ciphers in counter (CTR) mode. oval:org.secpod.oval:def:80350 SSH _MUST_ be configured with an Active Server Alive Maximum Count set to zero. Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled on the console or console port that has been left unatte ... oval:org.secpod.oval:def:80355 If the system does not require Trivial File Tansfer Protocol (TFTP), support it is non-essential and _MUST_ be disabled. The information system _MUST_ be configured to provide only essential capabilities. Disabling TFTP helps prevent the unauthorized connection of devices and the unauthorized transf ... oval:org.secpod.oval:def:80356 The system _MUST_ not have the Unix-to-Unix Copy Protocol (UUCP) service active. UUCP, a set of programs that enable the sending of files between different UNIX systems as well as sending commands to be executed on another system, is not essential and _MUST_ be disabled in order to prevent the unaut ... oval:org.secpod.oval:def:80353 Setting the LoginGraceTime parameter to a low number will minimize the risk of successful brute force attacks to the SSH server. It will also limit the number of concurrent unauthenticated connections While the recommended setting is 60 seconds (1 Minute), set the number based on site policy. oval:org.secpod.oval:def:80354 The System volume _MUST_ be mounted as read-only in order to ensure that configurations critical to the integrity of the macOS have not been compromised. System Integrity Protection (SIP) will prevent the system volume from being mounted as writable. oval:org.secpod.oval:def:80348 System use notifications are required only for access via login interfaces with human users and are not required when such human interfaces do not exist. The policy banner will show if a "PolicyBanner.rtf" or "PolicyBanner.rtfd" exists in the "/Library/Security" folder. oval:org.secpod.oval:def:80349 SSH warning banner should be enabled (and dependencies are met). oval:org.secpod.oval:def:80346 The system _MUST_ be configured to prevent access to other users home folders. The default behavior of macOS is to allow all valid users access to the the top level of every other users home folder while restricting access only to the Apple default folders within. oval:org.secpod.oval:def:80347 The built-in web server is a non-essential service built into macOS and _MUST_ be disabled. oval:org.secpod.oval:def:80340 The audit service must be configured to immediately print messages to the console or email administrator users when an auditing failure occurs. It is critical for the appropriate personnel to be made aware immediately if a system is at risk of failing to process audit logs as required. Without a rea ... oval:org.secpod.oval:def:80341 The system _MUST_ be configured to enforce multifactor authentication. All users _MUST_ go through multifactor authentication to prevent unauthenticated access and potential compromise to the system. oval:org.secpod.oval:def:80344 Enforce Smartcard Authentication for SSH oval:org.secpod.oval:def:80345 A deny-all and allow-by-exception firewall policy _MUST_ be employed for managing connections to other systems. Organizations _MUST_ ensure the built-in packet filter firewall is configured correctly to employ the default deny rule. Failure to restrict network connectivity to authorized systems perm ... oval:org.secpod.oval:def:80342 The system _MUST_ be configured such that, when the su command is used, multifactor authentication is enforced. All users _MUST_ go through multifactor authentication to prevent unauthenticated access and potential compromise to the system. oval:org.secpod.oval:def:80343 The system _MUST_ be configured to enforce multifactor authentication when the sudo command is used to elevate privilege. All users _MUST_ go through multifactor authentication to prevent unauthenticated access and potential compromise to the system. oval:org.secpod.oval:def:71722 To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types), organizations must disable or restrict unused or unnecessary physical and logical ports/protocols on information systems. Operating system ... oval:org.secpod.oval:def:71689 The permissions of the audit configuration files must be 0555 or less. In /etc/security, audit_class, audit_control, audit_event, audit_warn, and audit_user permissions set via chmod. oval:org.secpod.oval:def:71684 Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. If the information system or application allows the user to consecutively reuse their password when that password has exceeded its defined lifetime, the end re ... oval:org.secpod.oval:def:71665 When Printer Sharing is enabled, the computer is established as a print server to accept print jobs from other computers. Disabling Printer Sharing mitigates the risk of attackers attempting to exploit the print server to gain access to the system. Using dedicated print servers or direct IP printing ... oval:org.secpod.oval:def:71694 ICMP redirects are broadcast in order to reshape network traffic. A malicious user could use the system to send fake redirect packets and try to force all network traffic to pass through a network sniffer. Disabling ICMP redirect broadcasts mitigates this risk. oval:org.secpod.oval:def:71696 The audit service must be configured to require that records are kept for 7 days or longer before deletion when there is no central audit record storage facility. When expire-after is set to 7d, the audit service will not delete audit logs until the log data is at least 7 days old. oval:org.secpod.oval:def:71662 Screen sharing is a feature that lets computers on the same network connect to one another and to display the same screen. While sharing screens, the user can control the actions on that computer. The benchmark states that disabling screen sharing mitigates the risk of remote connections being made ... oval:org.secpod.oval:def:71712 The default global umask setting must be set to '027' for user applications. The setting '027' ensures that user created files and directories will be readable, but not writable, by users that share the same group id. Users with a different group id will not be able to read or write those files. Thi ... oval:org.secpod.oval:def:71681 By auditing access restriction enforcement, changes to application and OS configuration files can be audited. Without auditing the enforcement of access restrictions, it will be difficult to identify attempted attacks and an audit trail will not be available for forensic investigation. Enforcement a ... oval:org.secpod.oval:def:71675 Controls when, and if, a password hint is given the user, based on the number of failed login attempts. In loginwindow.plist, set the RetriesUntilHint key = X to show a hint after X login failures, or set the key = 0 to disable hints. oval:org.secpod.oval:def:71654 A filename extension is a suffix added to a base filename that indicates the base filenames file format. Visible filename extensions allow for the user to identify file types and the applications that files are associated with. It would help in identifying malicious files oval:org.secpod.oval:def:71723 Internet Protocol version 6 (IPv6) provides a new Internet layer of the TCP/IP protocol suite that replaces Internet Protocol version 4 (IPv4) and provides many benefits. If you are NOT using IPv6 disable it. oval:org.secpod.oval:def:71721 The group of bash 'init' files must be wheel. /etc/profile it is used to set system wide environmental variables on users shells. /etc/bashrc file is meant for setting command aliases and functions used by bash shell users. Use the command chgrp wheel /etc/bashrc /etc/profile to change group owner a ... oval:org.secpod.oval:def:71650 The root account should be disabled on all macOS systems, and a separate administrator 2252 account should be established for each person who will be performing regular administrative tasks. oval:org.secpod.oval:def:71708 Firewall logging must be enabled. This ensures that malicious network activity will be logged to the system. This requirement is NA if HBSS is used. oval:org.secpod.oval:def:71661 Operational staff should ensure that backups complete on a regular basis and the backups are tested to ensure that file restoration from backup is possible when needed. Backup dates are available even when the target volume is not available in the Time Machine plist. oval:org.secpod.oval:def:71713 The default global umask setting must be set to '027' for user applications. The setting '027' ensures that user created files and directories will be readable, but not writable, by users that share the same group id. Users with a different group id will not be able to read or write those files. Thi ... oval:org.secpod.oval:def:71716 Administrator users must never log in directly as root. To assure individual accountability and prevent unauthorized access, logging in as root over a remote connection must be disabled. Administrators should only run commands as root after first authenticating with their individual user names and p ... oval:org.secpod.oval:def:71659 By automatically installing app store updates in the background, the user safeguarded from potential vulnerabilities in the previous version of the App Store. oval:org.secpod.oval:def:71656 Automatically checking for updates makes it easier for the user to know when updates are available. It is important that a system has the newest updates applied to prevent unauthorized persons from exploiting identified vulnerabilities. oval:org.secpod.oval:def:71698 The operating system must enforce a minimum 15-character password length. The minimum password length must be set to 15 characters. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password length is one fact ... oval:org.secpod.oval:def:71693 The owner of the /etc/syslog.conf file must be root. The syslog.conf file is the configuration file for the syslogd(8) program. It consists of lines with two fields: the selector field which specifies the types of messages and priorities to which the line applies, and an action field which specifies ... oval:org.secpod.oval:def:71655 Bonjour is an auto-discovery mechanism for TCP/IP devices that enumerate devices and services within a local subnet. DNS on macOS is integrated with Bonjour and should not be turned off, but the Bonjour advertising service can be disabled. oval:org.secpod.oval:def:71707 The audit service should shut down the computer if it is unable to audit system events. Once audit failure occurs, user and system activity is no longer recorded and malicious activity could go undetected. Audit processing failures include: software/hardware errors; failures in the audit capturing m ... oval:org.secpod.oval:def:71688 The sudo command must be configured to prompt for the administrator user's password at least once in each newly opened Terminal window or remote login session, as this prevents a malicious user from taking advantage of an unlocked computer or an abandoned login session to bypass the normal password ... oval:org.secpod.oval:def:71676 Controls whether inactivity logs out a user and, if so, how many minutes are required to trigger logout. In .GlobalPreferences.plist, delete the AutoLogoutDelay key to disable inactivity logout. oval:org.secpod.oval:def:71664 Apples File Sharing feature uses a combination of SMB (Windows sharing) and AFP (Mac sharing). According to the benchmark (macOS), by disabling file sharing, the risk of unauthorized access to files stored on the system can be reduced. oval:org.secpod.oval:def:71673 Controls whether a user can use the OSX GUI to start or switch to a login session running as another user concurrently. In .GlobalPreferences.plist, set the MultipleSessionEnabled key to false to disable fast user switching. oval:org.secpod.oval:def:71714 When operating system accounts are removed, user accessibility is affected. The system must audit account removal actions so that administrator users can detect and respond to such events. Such a capability greatly reduces the risk that operating system accessibility will be negatively affected for ... oval:org.secpod.oval:def:71699 The kernel extension for Wi-Fi network devices such as Airport must be removed to ensure that users will not be able to reactivate wireless networking at a later time. System updates will sometimes replace deleted kernel extensions. Administrator users may need to periodically check to ensure that t ... oval:org.secpod.oval:def:71704 The owner of the /etc/services file must be root. The services file contains information regarding the known services available in the DARPA Internet. For each service a single line should be present with the following information: official service name, port number, protocol name, aliases. oval:org.secpod.oval:def:71710 The permissions of csh init files must be 644 or as appropriate. Use the command chmod 644 /etc/csh.cshrc /etc/csh.login /etc/csh.logout to set permissions of csh init files or as appropriate. oval:org.secpod.oval:def:71658 This setting allows macOS updates to be installed automatically once they are available from Apple. Because patches need to be applied as soon as possible, allowing for automatic updates ensures that the users device is updated in a timely manner rather than be left vulnerable to additional security ... oval:org.secpod.oval:def:71715 If events associated with non-local administrative access or diagnostic sessions are not logged, a major tool for assessing and investigating attacks would not be available. This requirement addresses auditing-related issues associated with maintenance tools used specifically for diagnostic and repa ... oval:org.secpod.oval:def:71685 The permissions of bash 'init' files must be 444 or as appropriate. /etc/profile it is used to set system wide environmental variables on users shells. /etc/bashrc file is meant for setting command aliases and functions used by bash shell users. oval:org.secpod.oval:def:71680 Bluetooth Sharing must be disabled. Bluetooth sharing allows users to wirelessly transmit files between Mac OS X and Bluetooth-enabled devices, including personally owned cell phones and tablets. A malicious user might introduce viruses or malware onto the system or extract sensitive files. Disablin ... oval:org.secpod.oval:def:71653 The sudo command lets the user run programs as the root user, granting them high levels of configurability within the system. The sudo command stays logged in as the root user for five minutes before timing out and re-requesting a password. This five-minute window should be eliminated since it leave ... oval:org.secpod.oval:def:71674 The setting controls whether local user accounts are visible in the login window. In loginwindow.plist, set the SHOWFULLNAME key = true to hide local user accounts. If the key does not exist, user accounts are displayed. oval:org.secpod.oval:def:71702 A source-routed packet attempts to specify the network path the packet should take. If the system is not configured to block the incoming source-routed packets, an attacker can redirect the system's network traffic. Configuring the system to drop incoming source-routed IPv4 packets mitigates this ri ... oval:org.secpod.oval:def:71691 The permissions of the /etc/services file must be 0644 or less. The services file contains information regarding the known services available in the DARPA Internet. For each service a single line should be present with the following information: official service name, port number, protocol name, ali ... oval:org.secpod.oval:def:71703 SSH should be configured to log users out after a 15 minute interval of inactivity and to only wait 30 seconds before timing out login attempts. Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session ... oval:org.secpod.oval:def:71672 The system must allow only applications downloaded from the App Store to run. Gatekeeper settings must be configured correctly to only allow the system to run applications downloaded from the Mac App Store. Administrator users will still have the option to override these settings on a per app basis. ... oval:org.secpod.oval:def:71668 The wake for network access feature enables other users to access a computers shared resources even if the computer is in sleep mode. The macOS benchmark states disabling the wake for network access feature could mitigate the risk of an attacker remotely waking the system to gain access to it oval:org.secpod.oval:def:71682 Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password complexity is one factor of several that deter ... oval:org.secpod.oval:def:71720 The group of the /etc/services file must be wheel. The services file contains information regarding the known services available in the DARPA Internet. For each service a single line should be present with the following information: official service name, port number, protocol name, aliases. oval:org.secpod.oval:def:71666 NFS sharing could be enabled to allow someone on another computer to mount shares and gain access to information from the users computer. File serving should not be done from a user desktop, dedicated servers should be used. Open ports make it easier to exploit the computer. oval:org.secpod.oval:def:71690 Remote access services, such as those providing remote access to network devices and information systems, increase risk and expose those systems to possible cyber attacks, so all remote access should be closely monitored and audited. Only authorized users should be permitted to remotely access DoD n ... oval:org.secpod.oval:def:71701 ICMP Timestamp requests reveal information about the system and can be used to determine which operating system is installed. Precise time data can also be used to launch time based attacks against the system. Configuring the system to drop incoming ICMPv4 timestamp requests mitigates these risks. oval:org.secpod.oval:def:71670 A custom message that can be displayed at the lock screen and FileVault login screen. Often used to warn people of permitted system actions and possible legal consequences of misuse. The CIS benchmark (macOS) states that displaying an access warning may reduce an attackers tendency to access the sys ... oval:org.secpod.oval:def:71695 A source-routed packet attempts to specify the network path that the system should take. If the system is not configured to block the sending of source-routed packets, an attacker can redirect the system's network traffic. oval:org.secpod.oval:def:71667 DVD or CD sharing allows other users to remotely access the systems optical drive. Disabling this feature will minimize the risk of an attacker accessing the optical drive and using it as a vector to expose sensitive data. oval:org.secpod.oval:def:71719 The group of the /etc/syslog.conf file must be wheel. The syslog.conf file is the configuration file for the syslogd(8) program. It consists of lines with two fields: the selector field which specifies the types of messages and priorities to which the line applies, and an action field which specifie ... oval:org.secpod.oval:def:71686 The group of the audit logs must be wheel. The audit files are under /var/audit; set the group for each via chgrp. oval:org.secpod.oval:def:71678 Infrared [IR] kernel support must be disabled to prevent users from controlling the system with IR devices. By default, if IR is enabled, the system will accept IR control from any remote. oval:org.secpod.oval:def:71663 Correct date and time settings are required for authentication protocols, file creation, modification dates, and log entries. If the time on the Mac is off by more than 5 minutes, Apples single sign-on feature and active directory logins may be affected. Setting date and time automatically oval:org.secpod.oval:def:71717 The group of csh init files must be wheel. Use the command chown :0 /etc/csh.cshrc /etc/csh.login /etc/csh.logout to change the group owner as appropriate. oval:org.secpod.oval:def:71671 Enabling stealth mode prevents the computer from responding to probing requests. The computer still answers incoming requests for authorized apps. Unexpected requests, such as ICMP (ping) are ignored. oval:org.secpod.oval:def:71669 A custom message that can be displayed at the lock screen and FileVault login screen. Often used to warn people of permitted system actions and possible legal consequences of misuse. The CIS benchmark (macOS) states that displaying an access warning may reduce an attackers tendency to access the sys ... oval:org.secpod.oval:def:71697 The audit service must be configured to require a minimum percentage of free disk space in order to run. This ensures that audit will notify the administrator that action is required to free up more disk space for audit logs. When minfree is set to 25%, security personnel are notified immediately wh ... oval:org.secpod.oval:def:71652 Allowing guests to connect to shared folders lets users access such folders from different computers on a network. Not allowing guests to connect to shared folders mitigates the risk of an untrusted user doing basic reconnaissance and gaining unauthorized access to the system. oval:org.secpod.oval:def:71692 ICMP redirects are broadcast in order to reshape network traffic. A malicious user could craft fake redirect packets and try to force all network traffic to pass through a network sniffer. If the system is not configured to ignore these packets, it could be susceptible to this kind of attack. oval:org.secpod.oval:def:71706 IP forwarding for IPv4 must not be enabled, unless the system is a router, as only authorized systems should be permitted to operate as routers. oval:org.secpod.oval:def:71709 The root account must be the only account having a UID of 0. The built in root account is disabled by default and administrator users are required to use sudo to run a process with the UID '0'. If another account with UID '0' exists, this is a sign of a network intrusion or a malicious user that is ... oval:org.secpod.oval:def:71651 The Guest account, a special managed account, is considered a security vulnerability in most situations because it has no password associated with it. oval:org.secpod.oval:def:71711 An attacker might attempt to log in as an authorized user, through stolen credentials, unpatched exploits, or brute force attempts to guess a valid username and password. If a user is attempting to log in to a system at an unusual time, or if there are many failed attempts, there is a possibility th ... oval:org.secpod.oval:def:71718 The owner of 'csh init' files must be root or as appropriate. Use the command chown root /etc/csh.cshrc /etc/csh.login /etc/csh.logout to change the owner as appropriate. oval:org.secpod.oval:def:71657 This control ensures that system and security updates are installed after they are available from Apple. According to the benchmark (macOS), staying up to date on patches is necessary to reduce the risk of vulnerabilities being exploited. oval:org.secpod.oval:def:71677 Hide or display the sleep, restart, and shutdown buttons, in the login window. In loginwindow.plist, set the PowerOffDisabled key = true to hide the buttons. If the key does not exist, buttons are displayed. oval:org.secpod.oval:def:74172 The host is installed with Apple Mac OS 11.5, Mac OS X 10.14.6 or 10.15.7 and is prone to an access vulnerability. A flaw is present in the application, which fails to properly handle access restrictions issue. On successful exploitation, a sandboxed process may be able to circumvent sandbox restric ... oval:org.secpod.oval:def:75662 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. Successful exploitation allows an attack ... oval:org.secpod.oval:def:75661 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows an attacker ... oval:org.secpod.oval:def:77519 The host is installed with Apple Mac OS 12 before 12.2 or Apple Mac OS 11 before 11.6.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. On successful exploitation, malicious application may be able to execute ... oval:org.secpod.oval:def:77518 The host is installed with Apple Mac OS 12 before 12.2 or Apple Mac OS 11 before 11.6.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a path validation issue. On successful exploitation, application may be able to access a ... oval:org.secpod.oval:def:77517 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.3 or Apple Mac OS 12 before 12.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a permissions validation issue. On successful exploitation, appli ... oval:org.secpod.oval:def:77516 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.3 or Apple Mac OS 12 before 12.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. On successful exploitation, processi ... oval:org.secpod.oval:def:77513 The host is missing a security update according to Apple advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle multiple issues. On successful exploitation, allow attackers to execute arbitrary code, cause denial of service o ... oval:org.secpod.oval:def:77520 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.3 or Apple Mac OS 12 before 12.2 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. On successful exploitation, malicious applicat ... oval:org.secpod.oval:def:94367 The host is installed with Jenkins LTS 2.60.1 through 2.414.1 or Jenkins rolling release 2.50 through 2.423 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle filtering builds in the build history widget. Successful exploitation allow ... oval:org.secpod.oval:def:94368 The host is installed with Jenkins LTS through 2.414.1 or Jenkins rolling release through 2.423 and is prone to a stored cross-site scripting (xss) vulnerability. A flaw is present in the application, which fails to handle caption constructor parameter of ExpandableDetailsNote. Successful exploitati ... oval:org.secpod.oval:def:94369 The host is installed with Jenkins LTS through 2.414.1 or Jenkins rolling release through 2.423 and is prone to an incorrect default permissions vulnerability. A flaw is present in the application, which fails to handle default permissions for temporary files created in the system temporary directo ... oval:org.secpod.oval:def:94370 The host is installed with Jenkins LTS through 2.414.1 or Jenkins rolling release through 2.423 and is prone to an unrestricted upload of file with dangerous type vulnerability. A flaw is present in the application, which fails to handle default permissions for newly created files. On successful exp ... oval:org.secpod.oval:def:94371 The host is installed with Jenkins LTS through 2.414.1 or Jenkins rolling release through 2.423 and is prone to an unrestricted upload of file with dangerous type vulnerability. A flaw is present in the application, which fails to handle default permissions for newly created files. On successful exp ... oval:org.secpod.oval:def:77515 The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 11 before 11.6.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. On successful exploitation, a malicious application may be able to bypass certa ... oval:org.secpod.oval:def:75675 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an at ... oval:org.secpod.oval:def:75686 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attac ... oval:org.secpod.oval:def:75685 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows an attacker ... oval:org.secpod.oval:def:75684 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. Successful exploitation allows an ... oval:org.secpod.oval:def:75659 The host is missing a security update according to Apple advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle multiple issues. Successful exploitation allow attackers to execute arbitrary code, cause denial of service or di ... oval:org.secpod.oval:def:75679 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows an attacker ... oval:org.secpod.oval:def:75682 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a permissions logic issue. Successful exploitation allows an at ... oval:org.secpod.oval:def:75681 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle bounds check issue. Successful exploitation allows an attacker t ... oval:org.secpod.oval:def:75680 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle bounds check issue. Successful exploitation allows an attacker t ... oval:org.secpod.oval:def:75678 The host is installed with Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to an authentication vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. Successful exploitation allows an attacker to view the previous lo ... oval:org.secpod.oval:def:75677 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attac ... oval:org.secpod.oval:def:75674 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle bounds check issue. Successful exploitation allows an attacker ... oval:org.secpod.oval:def:75673 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a state related issue. Successful exploitation allows an a ... oval:org.secpod.oval:def:75672 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an inherited permissions issue. Successful exploitation allows ... oval:org.secpod.oval:def:75671 The host is installed with Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows an attacker to execute arbitrary co ... oval:org.secpod.oval:def:75670 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows ... oval:org.secpod.oval:def:75669 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to an out-of-bounds vulnerability. A flaw is present in the application, which fails to properly handle a bounds check issue. Successful exploitation allows an attacker to c ... oval:org.secpod.oval:def:75668 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to an out-of-bounds vulnerability. A flaw is present in the application, which fails to properly handle a bounds check issue. Successful exploitation allows an attacker to c ... oval:org.secpod.oval:def:75667 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to an out-of-bounds vulnerability. A flaw is present in the application, which fails to properly handle a bounds check issue. Successful exploitation allows an attacker to c ... oval:org.secpod.oval:def:75664 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle a bounds check issue. Successful exploitation allows an attacker ... oval:org.secpod.oval:def:75663 The host is installed with Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a locking issue. Successful exploitation allows an attacker to execute arbitrary c ... oval:org.secpod.oval:def:73690 The host is installed with Jenkins LTS through 2.289.1 or Jenkins rolling release through 2.299 and is prone to an incorrect authorization vulnerability. A flaw is present in the application, which fails to properly handle issues with permission checks. Successful exploitation could allows users to ... oval:org.secpod.oval:def:73691 The host is installed with Jenkins LTS through 2.289.1 or Jenkins rolling release through 2.299 and is prone to a session fixation vulnerability. A flaw is present in the application, which fails to properly handle issues with validation of sessions. Successful exploitation could allows attackers to ... oval:org.secpod.oval:def:74190 The host is installed with Apple Mac OS 11.5 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle checks issue. On successful exploitation, a remote attacker may be able to cause arbitrary code execution. oval:org.secpod.oval:def:75131 The host is installed with Xcode before 13 on Apple Mac OS 11.3 or later and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle issue in nginx. Successful exploitation allows remote attacker to leak potentially sensitive information tr ... oval:org.secpod.oval:def:75134 The host is installed with Xcode before 13 on Apple Mac OS 11.3 or later and is prone to an uncontrolled resource consumption vulnerability. A flaw is present in the application, which fails to properly handle issue in nginx. Successful exploitation allows an attacker to cause infinite loop in a wor ... oval:org.secpod.oval:def:75133 The host is installed with Xcode before 13 on Apple Mac OS 11.3 or later and is prone to an uncontrolled resource consumption vulnerability. A flaw is present in the application, which fails to properly handle issue in nginx. Successful exploitation allows an attacker to cause excessive CPU usage. oval:org.secpod.oval:def:75132 The host is installed with Xcode before 13 on Apple Mac OS 11.3 or later and is prone to an uncontrolled resource consumption vulnerability. A flaw is present in the application, which fails to properly handle issue in nginx. Successful exploitation allows an attacker to cause excessive memory consu ... oval:org.secpod.oval:def:75136 The host is missing a security update according to the Apple advisory APPLE-SA-2021-09-20-4 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle issues in nginx. Successful exploitation allows an attacker to cause multiple impacts. oval:org.secpod.oval:def:75135 The host is installed with Xcode before 13 on Apple Mac OS 11.3 or later and is prone to an HTTP request smuggling vulnerability. A flaw is present in the application, which fails to properly handle issue in nginx. Successful exploitation allows an attacker to read unauthorized web pages in environm ... oval:org.secpod.oval:def:75676 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle checks issue. Successful exploitation allows attackers to eleva ... oval:org.secpod.oval:def:75683 The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a permissions logic issue. Successful exploitation allows an at ... oval:org.secpod.oval:def:77528 The host is installed with Apple Mac OS 12 before 12.2 or Apple Safari before 15.3 on Apple Mac OS 10.15.7 or Apple Mac OS 11 and is prone to a cross-origin scripting vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. On successful exploita ... oval:org.secpod.oval:def:77527 The host is installed with Apple Mac OS 12 before 12.2 or Apple Safari before 15.3 on Apple Mac OS 10.15.7 or Apple Mac OS 11 and is prone to a logic vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. On successful exploitation, processing m ... oval:org.secpod.oval:def:77526 The host is installed with Apple Mac OS 12 before 12.2 or Apple Safari before 15.3 on Apple Mac OS 10.15.7 or Apple Mac OS 11 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to properly handle a memory management issue. On successful exploitation, pr ... oval:org.secpod.oval:def:77525 The host is installed with Apple Mac OS 12 before 12.2 or Apple Safari before 15.3 on Apple Mac OS 10.15.7 or Apple Mac OS 11 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. On successful exploitation ... oval:org.secpod.oval:def:77511 The host is missing a security update according to Apple advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle multiple issues. On successful exploitation, allow attackers to execute arbitrary code. oval:org.secpod.oval:def:74156 The host is installed with Apple Mac OS 11.5 or Apple Safari before 14.1.2 on MacOS Mojave or MacOS Catalina and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to properly handle state handling issue. On successful exploitation, processing maliciously c ... oval:org.secpod.oval:def:74153 The host is missing a security update according to Apple advisory, APPLE-SA-2021-07-21-2. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle multiple issues. Successful exploitation allows attackers to cause arbitrary code executio ... oval:org.secpod.oval:def:74187 The host is installed with Apple Mac OS 11.5, Mac OS X 10.14.6 or 10.15.7 and is prone to an multiple vulnerability. A flaw is present in the application, which fails to properly handle memory handling issue. On successful exploitation, processing maliciously crafted web content may lead to arbitrar ... oval:org.secpod.oval:def:74185 The host is installed with Apple Mac OS 11.5 or Apple Safari before 14.1.2 on MacOS Mojave or MacOS Catalina and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle checks issue. On successful exploitation, processing maliciously cra ... oval:org.secpod.oval:def:74183 The host is installed with Apple Mac OS 11.5 and is prone to an use after free vulnerability. A flaw is present in the application, which fails to properly handle memory management issue. On successful exploitation, processing maliciously crafted web content may lead to arbitrary code execution. oval:org.secpod.oval:def:88888 The host is installed with Apple Safari before 16.4.1 on Apple Mac OS 11 or Apple Mac OS 12, Apple Mac OS 13 before 13.3.1 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to properly handle issues in improved memory management. On successful exploita ... oval:org.secpod.oval:def:88886 The host is missing a security update according to Apple advisory. The update is required to fix use after free vulnerability. A flaw is present in the application, which fails to issues in improved memory management. Successful exploitation allow attackers to execute arbitrary code. oval:org.secpod.oval:def:71507 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle improper checks. Successful exploitation allows an attacker to cause arbitrary c ... oval:org.secpod.oval:def:71506 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to elevate their privileg ... oval:org.secpod.oval:def:71509 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allows an attacker to execute arbitrary c ... oval:org.secpod.oval:def:71508 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to cause unexpected appli ... oval:org.secpod.oval:def:71503 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to cause unexpected syste ... oval:org.secpod.oval:def:71502 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to gain root privilege ... oval:org.secpod.oval:def:71505 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a permissions logic issue. Successful exploitation allows attackers to elevate their ... oval:org.secpod.oval:def:71504 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle a bounds checking issue. Successful exploitation allows an attacker to execute arbitr ... oval:org.secpod.oval:def:71501 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. Successful exploitation allows an attacker to disclose p ... oval:org.secpod.oval:def:71500 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to read restricted memory ... oval:org.secpod.oval:def:71518 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a race condition ulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to gain root privileges. oval:org.secpod.oval:def:71517 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to an out-of-bounds vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to cause arbitrary co ... oval:org.secpod.oval:def:71514 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a double free vulnerability. A flaw is present in the application, which fails to properly handle a memory management issue. Successful exploitation allows an attacker to cause heap corruption ... oval:org.secpod.oval:def:71513 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an API issue in Accessibility TCC permissions. Successful exploitation allows an atta ... oval:org.secpod.oval:def:71516 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to leak sensitive ... oval:org.secpod.oval:def:71515 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to an A use after free vulnerability. A flaw is present in the application, which fails to properly handle a memory management issue. Successful exploitation allows an attacker to cause arbitrary ... oval:org.secpod.oval:def:71510 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a memory initialization vulnerability. A flaw is present in the application, which fails to properly handle a memory issue. Successful exploitation allows an attacker to disclose sensitive use ... oval:org.secpod.oval:def:71512 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allows attackers to elevate their privileges. oval:org.secpod.oval:def:71511 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a memory initialization vulnerability. A flaw is present in the application, which fails to properly handle a memory issue. Successful exploitation allows an attacker to disclose kernel memory ... oval:org.secpod.oval:def:71499 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to read restricted memory ... oval:org.secpod.oval:def:71498 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a permissions issue. Successful exploitation allows an attacker to modify protected p ... oval:org.secpod.oval:def:71495 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle an imput validation issue. Successful exploitation allows an attacker to cause a denial of ... oval:org.secpod.oval:def:71494 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle improper checks. Successful exploitation allows a remote attacker to cause a denial of s ... oval:org.secpod.oval:def:71497 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a path traversal vulnerability. A flaw is present in the application, which fails to properly handle a path validation issue. Successful exploitation allows an attacker to modify protected par ... oval:org.secpod.oval:def:71496 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to properly handle improper checks. Successful exploitation allows an attacker to provide a fraudulent OCSP response ... oval:org.secpod.oval:def:71469 The host is installed with Apple Mac OS 11.x before 11.3 or Mac OS X 10.15 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to disclose restricted memory. oval:org.secpod.oval:def:71466 The host is installed with Apple Mac OS 11.x before 11.3 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to properly handle a state issue. Successful exploitation allows an attacker to execute arbitrary code with kernel privileges. oval:org.secpod.oval:def:71465 The host is installed with Apple Mac OS 11.x before 11.3 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allows an attacker to cause a cross site scripting attack. oval:org.secpod.oval:def:71468 The host is installed with Apple Mac OS 11.x before 11.3 or Mac OS X 10.15 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle a bounds checking issue. Successful exploitation allows an attacker to execute arbitrary code with ker ... oval:org.secpod.oval:def:71467 The host is installed with Apple Mac OS 11.x before 11.3 or Mac OS X 10.15 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a permissions logic issue. Successful exploitation allows an attacker to cause copied files to have un ... oval:org.secpod.oval:def:71462 The host is installed with Apple Mac OS 11.x before 11.3 and is prone to a path traversal vulnerability. A flaw is present in the application, which fails to properly handle a path validation issue. Successful exploitation allows an attacker to modify protected parts of the file system. oval:org.secpod.oval:def:71461 The host is installed with Apple Mac OS 11.x before 11.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle improper checks. Successful exploitation allows an attacker to cause arbitrary code execution. oval:org.secpod.oval:def:71464 The host is installed with Apple Mac OS 11.x before 11.3 and is prone to a memory initialization vulnerability. A flaw is present in the application, which fails to properly handle a memory issue. Successful exploitation allows an attacker to disclose sensitive user information. oval:org.secpod.oval:def:71463 The host is installed with Apple Mac OS 11.x before 11.3 and is prone to a memory corruption issue vulnerability. A flaw is present in the application, which fails to properly handle improper checks. Successful exploitation allows an attacker to cause arbitrary code execution. oval:org.secpod.oval:def:71471 The host is installed with Apple Mac OS 11.x before 11.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allows attackers to elevate their privileges. oval:org.secpod.oval:def:71470 The host is installed with Apple Mac OS 11.x before 11.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a code signature validation issue. Successful exploitation allows an attacker to bypass Privacy preferences. oval:org.secpod.oval:def:71459 The host is installed with Apple Mac OS 11.x before 11.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle improper checks. Successful exploitation allows an attacker to cause arbitrary code execution. oval:org.secpod.oval:def:71458 The host is installed with Apple Mac OS 11.x before 11.3 or Apple Safari before 14.1 on MacOS Mojave or MacOS Catalina and is prone to a use after free vulnerability. A flaw is present in the application, which fails to properly handle a memory management issue. Successful exploitation allows a remo ... oval:org.secpod.oval:def:71455 The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allows an attacker to bypass Gatekeeper checks. oval:org.secpod.oval:def:71454 The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a path traversal vulnerability. A flaw is present in the application, which fails to properly handle a path validation issue. Successful exploitation allows an attacker to modify protected parts of the ... oval:org.secpod.oval:def:71457 The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle an entitlements issue. Successful exploitation allows an attacker to gain elevated privileges. oval:org.secpod.oval:def:71456 The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an entitlements issue. Successful exploitation allows an attacker with root privileges to a ... oval:org.secpod.oval:def:71453 The host is missing a security update according to Apple advisory, APPLE-SA-2021-04-26-2. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle multiple issues. Successful exploitation allow attackers to execute arbitrary code. oval:org.secpod.oval:def:71460 The host is installed with Apple Mac OS 11.x before 11.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle improper checks. Successful exploitation allows an attacker to cause arbitrary code execution. oval:org.secpod.oval:def:71488 The host is installed with Apple Mac OS 11.x before 11.3 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to properly handle a memory management issue. On successful exploitation, processing maliciously crafted web content may lead to arbitrary code e ... oval:org.secpod.oval:def:71487 The host is installed with Apple Mac OS 11.x before 11.3 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle a bounds checking issue. On successful exploitation, a malicious application may be able to disclose kernel memory. oval:org.secpod.oval:def:71489 The host is installed with Apple Mac OS 11 before 11.3 or Apple Safari before 14.1 on MacOS Mojave or MacOS Catalina and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle an input validation issue. Successful exploitation allows attackers t ... oval:org.secpod.oval:def:71484 The host is installed with Apple Mac OS 11.x before 11.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. On successful exploitation, a malicious application may bypass Gatekeeper checks. oval:org.secpod.oval:def:71483 The host is installed with Apple Mac OS 11.x before 11.3 or Mac OS X 10.15 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle a permissions logic issue. On successful exploitation, an application may be able to execute arbitrary ... oval:org.secpod.oval:def:71486 The host is installed with Apple Mac OS 11.x before 11.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. On successful exploitation, a malicious application may be able to leak sensitive user informatio ... oval:org.secpod.oval:def:71485 The host is installed with Apple Mac OS 11.x before 11.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a file metadata issue. On successful exploitation, a malicious application may bypass Gatekeeper checks. oval:org.secpod.oval:def:71477 The host is installed with Apple Mac OS 11.x before 11.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a cache occupancy determination issue. Successful exploitation allows attackers to track users by setting state in a ... oval:org.secpod.oval:def:71476 The host is installed with Apple Mac OS 11.x before 11.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a cache occupancy determination issue. Successful exploitation allows attackers to track users by setting state in a ... oval:org.secpod.oval:def:71479 The host is installed with Apple Mac OS 11.x before 11.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. On successful exploitation, muting a CallKit call while ringing may not result in mute being enabled. oval:org.secpod.oval:def:71478 The host is installed with Apple Mac OS 11.x before 11.3 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows attackers to execute arbitrary code with kernel privileges. oval:org.secpod.oval:def:71473 The host is installed with Apple Mac OS 11.x before 11.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allows attackers to force unnecessary network connections to fetch its favicon. oval:org.secpod.oval:def:71472 The host is installed with Apple Mac OS 11.x before 11.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allows attackers to force unnecessary network connections to fetch its favicon. oval:org.secpod.oval:def:71475 The host is installed with Apple Mac OS 11.x before 11.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allows attackers to cause Locked Notes content to be unexpectedly unlocked. oval:org.secpod.oval:def:71474 The host is installed with Apple Mac OS 11.x before 11.3 or Mac OS X 10.15 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle a bounds checking issue. Successful exploitation allows attackers to cause arbitrary code execution. oval:org.secpod.oval:def:71480 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a heap corruption vulnerability. A flaw is present in the application, which fails to properly handle improper checks. On successful exploitation, processing maliciously crafted server message ... oval:org.secpod.oval:def:71482 The host is installed with Apple Mac OS 11.x before 11.3 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle improper locking. On successful exploitation, processing a maliciously crafted image may lead to arbitrary code execution ... oval:org.secpod.oval:def:71481 The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11.x before 11.3 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly handle improper locking. On successful exploitation, a remote attacker may be able to cause a deni ... oval:org.secpod.oval:def:85007 The host is installed with Apple Mac OS 11 before 11.7.1 or Apple Mac OS 12 before 12.6.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle issues in unspecified impact. On successful exploitation, a remote user may be able to cau ... oval:org.secpod.oval:def:85006 The host is installed with Apple Mac OS 11 before 11.7.1 or Apple Mac OS 12 before 12.6.1 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly handle protected parts of the file system. On successful exploitation, an app may be able to modify p ... oval:org.secpod.oval:def:85008 The host is installed with Apple Mac OS 11 before 11.7.1 or Apple Mac OS 12 before 12.6.1 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle issues in data protection. On successful exploitation, an app with root privileges may be ab ... oval:org.secpod.oval:def:85003 The host is installed with Apple Safari before 16.1 on Apple Mac OS 12 or Apple Mac OS 11 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to process maliciously crafted web content, which was addressed with improved memory handling. Successful exploi ... oval:org.secpod.oval:def:85002 The host is installed with Apple Safari before 16.1 on Apple Mac OS 12 or Apple Mac OS 11 and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to properly handle user-supplied data in WebKit. On successful exploitation, visiting a malicious website may lead to ... oval:org.secpod.oval:def:85005 The host is installed with Apple Safari before 16.1 on Apple Mac OS 12 or Apple Mac OS 11 and is prone to an use after free vulnerability. A flaw is present in the application, which fails to handle issues in memory management. Successful exploitation could lead to arbitrary code execution. oval:org.secpod.oval:def:85004 The host is installed with Apple Safari before 16.1 on Apple Mac OS 12 or Apple Mac OS 11 and is prone to a logic vulnerability. A flaw is present in the application, which fails to handle issues in state management. On successful exploitation, processing maliciously crafted web content may disclose ... oval:org.secpod.oval:def:85001 The host is missing a security update according to Apple advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle multiple issues. Successful exploitation allow attackers to execute arbitrary code or disclose sensitive informat ... oval:org.secpod.oval:def:85000 The host is missing a security update according to Apple advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle multiple issues. Successful exploitation allow attackers to execute arbitrary code, cause denial of service or di ... oval:org.secpod.oval:def:93290 The host is installed with Oracle Java SE through 8u401 or Apple Safari before 16.6.1 on Apple Mac OS 11, Apple Mac OS 12, or Apple Safari before 17.0 on Apple Mac OS 13, or Apple Mac OS before 14.0 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, whic ... oval:org.secpod.oval:def:93295 The host is missing a security update according to Apple advisory. The update is required to fix a privilege escalation vulnerability. A flaw is present in the application, which fails to handle issues in improved checks. Successful exploitation may lead to arbitrary code execution. |