The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an empty boolean element. Successful exploitation could allow attackers to crash the service.
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation could allow attackers to execute arbitrary code with kernel privileges.
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly validate input. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly validate input. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly validate input. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly validate input. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly validate input. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted .dfont file. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an infinite recursion. Successful exploitation could allow attackers to crash the service.