{"uuid": "a6f5355c-7a95-47b1-9783-88560c05e43a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-6336", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15200", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2018-6336\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in osquery. A maliciously crafted Universal/fat binary can evade third-party code signing checks. By not completing full inspection of the Universal/fat binary, the user of the third-party tool will believe that the code is signed by Apple, but the malicious unsigned code will execute. This issue affects osquery prior to v3.2.7\n\ud83d\udccf Published: 2018-12-31T20:00:00.000Z\n\ud83d\udccf Modified: 2025-05-06T19:00:51.800Z\n\ud83d\udd17 References:\n1. https://www.okta.com/security-blog/2018/06/issues-around-third-party-apple-code-signing-checks/", "creation_timestamp": "2025-05-06T19:21:18.000000Z"}