The host is installed with Google Picasa and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle certain properties of JPEG images. Successful exploitation could allow remote attackers to execute arbitrary code with the privilege of the running application.