The host is installed with Adobe Flash Player and is prone to remote buffer overflow vulnerability. A flaw is present in the application which is caused by unspecified boundary error. Successful exploitation allows remote attacker to to execute arbitrary code.