The host is installed with Google Chrome and is prone to use-after-free vulnerability. A flaw is present in the browser, which fails to handle DOM ids. Successful exploitation could allow remote attackers to execute remote code or cause denial of service.