The host is installed with Google Chrome before 79.0.3945.130 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to handle a specially crafted web page. Successful exploitation allows attackers to execute arbitrary code on the target system.