The host is installed with Word for Mac 2011 or Office 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could run arbitrary code in the context of the current user.
The host is installed with Word for Office 2011 for Mac and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could run arbitrary code in the context of the current user.
The host is installed with Word for Office 2011 for Mac and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could run arbitrary code in the context of the current user.
The host is installed with Microsoft Autoupdater for Mac and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could run arbitrary code in the context of the current user.
The host is installed with Adobe Digital Editions before 4.5.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allow attackers to lead to a memory address leak.
The host is installed with Adobe Digital Editions before 4.5.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allow attackers to disclose information.
The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code with kernel privileges.
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle apache_mod_php. Successful exploitation could allow attackers to cause an unexpected application termination or arbitrary code execution.
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle input validation. Successful exploitation could allow local user to cause system denial of service.
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle access restrictions. Successful exploitation could allow local attacker to modify downloaded mobile assets.