The host is installed with Apple MacOS X before 10.15 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation could allow attackers to execute arbitrary code with system privileges.