The host is installed with Google Chrome and is prone to denial of service vulnerability. A flaw is present in the browser, which fails to handle drop-down lists resulting in stale pointers. Successful exploitation could allow remote attackers to execute remote code or cause denial of service.