The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to cause a denial of service.
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers may gain access to privileged applications.
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to gain root privileges.
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to exploit weaknesses in the 3DES cryptographic algorithm.
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to cause a denial of service.
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow certificates may be unexpectedly evaluated as trusted.
The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to gain root privileges.
The host is installed with Apple Mac OS X or Server 10.12.2 and is prone to a stack overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted imagefilltoborder call that triggers use of a negative color value. Successful exploitation could allow attackers to crash the service.
The host is installed with Apple Mac OS X or Server 10.12.2 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle a crafted serialized data in a wddxPacket XML document. Successful exploitation could allow attackers to crash the service.
The host is installed with Apple Mac OS X or Server 10.12.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation could allow attackers to execute arbitrary code with kernel privileges.