The host is installed with Apple Safari before 10.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Apple Safari before 10.0.3 and is prone to an address bar spoofing vulnerability. A flaw is present in the application, which fails to properly perform URL validation. Successful exploitation could allow attackers to perform address bar spoofing.
The host is installed with Apple Safari before 10.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Apple Safari before 10.1 and is prone to an address bar spoofing vulnerability. A flaw is present in the application, which fails to properly handle text input until the destination page loads. Successful exploitation could allow attackers to lead to address bar spoofing.
The host is installed with Apple Safari before 10.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to cause a denial of service.
The host is installed with Apple Safari before 10.1 and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to properly handle FaceTime prompts. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Apple Safari before 10.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a keychain item management. Successful exploitation could allow attackers to access locked keychain items.
The host is installed with Apple Safari before 10.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted link. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Apple Safari before 10.1 and is prone to a cross-origin resource sharing vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to exfiltrate data cross-origin.
The host is installed with Apple Safari before 10.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code.