The host is installed with Google Chrome and is prone to remote code execution vulnerability. A flaw is present in the browser which fails to handle off-by-three errors in GPU process. Successful exploitation could allow remote attackers to execute arbitrary code on the affected system.