The host is installed with Apple Safari before 10.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Apple Safari before 10.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Apple Safari before 10.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Apple Safari before 10.1 and is prone to an privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to lead to privilege escalation.
The host is installed with Apple Safari before 10.1 and is prone to a memory consumption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to lead to memory crash.
The host is installed with Apple Safari before 10.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to disclose process memory.
The host is installed with Apple Safari before 10.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Apple Safari before 10.1 and is prone to a cross-origin resource sharing vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to exfiltrate data cross-origin.
The host is installed with Apple Safari before 10.1 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to lead to cross site scripting.
The host is installed with Apple Safari before 10.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to execute arbitrary code.