The host is installed with Apple Mac OS X before 10.6.3 and is prone to a stack based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted PostScript document. Successful exploitation could allow attackers to crash the service.
The host is installed with Apple Mac OS X 10.5.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a macro invocation through invalid buffer. Successful exploitation could allow attackers to crash the service.
The host is installed with Xcode before 11.2 on Apple Mac OS X 10.14.4 or later and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted file. Successful exploitation may lead to arbitrary code execution.
The host is installed with Xcode before 11.2 on Apple Mac OS X 10.14.4 or later and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted file. Successful exploitation may lead to arbitrary code execution.
The host is installed with Apple Mac OS X 10.14.3 and is prone to a logic error vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. Successful exploitation allows an attacker to cause the recipient to answer through the initiator of a Group FaceTime call.
The host is installed with Apple Mac OS X 10.14.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to gain elevated privileges through an application.
The host is installed with Apple Mac OS X 10.14.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to produce unspecified impact on live photos in FaceTime server.
The host is installed with Apple Mac OS X 10.6.x through 10.6.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle errors. Successful exploitation could allow attackers to bypass the password requirement for shared-folder.
The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted PDF. Successful exploitation may lead to arbitrary code execution.
The host is installed with Apple Mac OS X Server before 10.6.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a string argument that represents a large number. Successful exploitation could allow remote attackers to crash the service.