The host is installed with Apple Safari before 5.0.5 and is prone to use-after-free vulnerability. A flaw is present in the application which fails to properly handle certain text nodes. Successful exploitation allows remote attackers to execute arbitrary code.