The host is installed with Apple Mac OS X before 10.6.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle vectors related to the embedding of these commands in the Authorization HTTP header. Successful exploitation could allow attackers to bypass intended access restrictions.