The host is installed with Apple Mac OS X 10.5.8 or 10.6.2 and is prone to multiple unspecified vulnerabilities. The flaw are present in the applications, which fail to sanitize user supplied input. Successful exploitation could allow attackers to execute arbitrary code.