The host is installed with Adobe Shockwave Player and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to sanitize user supplied data. Successful exploitation could allow an attacker to execute arbitrary code.