The host is installed with Adobe Flash Player and is prone to memory corruption vulnerability. A flaw is present in the application which is caused by unspecified memory corruption errors. Successful exploitation allows remote attacker to execute arbitrary code.