The host is installed with Apple Mac OS X 10.5.8 and is prone to multiple unspecified vulnerabilities. The flaws are present in the application, which fail to sanitize user supplied input. Successful exploitation could allow attackers to affect confidentiality, integrity, and availability.