The host is installed with Adobe Flash Player and is prone to remote memory corruption vulnerability. A flaw is present in the application which is caused by memory corruption errors via unspecified vectors. Successful exploitation allows remote attacker to execute arbitrary code or cause a denial of service condition.