The host is installed with Google Chrome, and is prone to a use-after-free vulnerability. A flaw is present in the browser, which fails to handle vectors related to developer tools . Successful exploitation could allow an attacker to crash the service or cause other unknown impact.