Safety vulnerability ID: 53993
The information on this page was manually curated by our Cybersecurity Intelligence Team.
An issue was discovered in Yelp OSXCollector. A maliciously crafted Universal/fat binary can evade third-party code signing checks. By not completing full inspection of the Universal/fat binary, the user of the third-party tool will believe that the code is signed by Apple, but the malicious unsigned code will execute.
Latest version: 1.12
A tool for answering "How'd that malware get there?"
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application