The host is installed with Google Chrome and is prone to security bypass vulnerability. A flaw is present in the browser, which fails to enforce ASLR/DEP/Sandbox security restrictions and fails to validate data. Successful exploitation could allow remote attackers to cause bypass security restriction, execute arbitrary code or cause denial of service.