Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The Code execution vulns for both OSX and Win10 probably. In windows clicking a UNC path link would pass hashs. I believe for OSX there was an installer trick that allowed any code to run if triggered.


Those vulnerabilities are fixed in current versions:

https://www.cvedetails.com/vulnerability-list/vendor_id-2159...

There is nothing new/outstanding.


But those vulnerabilities were there, at least on OSX, because they were trying to avoid OSX's security warnings. And this is not the first time they've done something skanky like that.

Once may have been an honest mistake; 2+ times is now a pattern.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: