The host is installed with Adobe Reader or Acrobat 8.1.2 or earlier and is prone to remote code execution vulnerability. The flaw is present in the application, which fails to handle the download manager. Successful exploitation allows remote attackers to change internet security options on a client machine.