A vulnerability allows remote attackers to execute arbitrary code on systems with vulnerable installations of the Adobe Flash Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
e58aacb85b120775f8a815d7a260a125dad2cc1f899e281ef2d919b0c4f1cc18