The host is installed with Apple Mac OS 10.8 before 10.13 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly perform access restrictions. Successful exploitation allows attackers to display results for files not belonging to the user.