The host is installed with Adobe Flash Player and is prone to arbitrary code execution vulnerability. A flaw is present in the application which is caused by memory corruption errors when processing malformed Flash content. Successful exploitation allows remote attacker to cause a denial of service condition.