The host is installed with Google Chrome and is prone to security bypass vulnerability. A flaw is present in the application, which fails to handle drag and drop operations. Successful exploitation will allow an attacker to bypass the policy settings.