The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.2 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted web site. Successful exploitation could allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption).