The host is missing a high severity security update according to the Google advisory and is prone to a use after free vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an attacker to cause unspecified impact.