The host is installed with macOS Server before 5.2 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow attackers to exploit weaknesses in the RC4 cryptographic algorithm.
A spoofing vulnerability exists in when Microsoft Outlook for Mac improperly validates HTML tag input. An attacker who successfully tricked the user could gain access to the user's authentication information or login credentials. In an email attack scenario an attacker could exploit the vulnerability by sending an email with specific HTML tags, that could display a malicious authentication prompt.
The host is installed with Adobe Flash Player before 25.0.0.148 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. An attacker who successfully exploited the vulnerability could execute arbitrary code.
The host is installed with Adobe Flash Player before 25.0.0.148 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. An attacker who successfully exploited the vulnerability could execute arbitrary code.
The host is installed with Adobe Flash Player before 25.0.0.148 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. An attacker who successfully exploited the vulnerability could execute arbitrary code.
The host is installed with Adobe Flash Player before 25.0.0.148 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. An attacker who successfully exploited the vulnerability could execute arbitrary code.
The host is installed with Adobe Flash Player before 25.0.0.148 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. An attacker who successfully exploited the vulnerability could execute arbitrary code.
The host is installed with Adobe Flash Player before 25.0.0.148 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. An attacker who successfully exploited the vulnerability could execute arbitrary code.
The host is installed with Adobe Flash Player before 25.0.0.148 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. An attacker who successfully exploited the vulnerability could execute arbitrary code.
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers to cause a WSP dissector infinite loop.