The host is installed with Apple Safari and is prone to multiple vulnerabilities. The flaws are present the application that are caused by input validation and implementation errors in WebKit. Successful exploitation allows attackers to bypass certain security checks, gain knowledge of sensitive information or execute arbitrary code