The host is missing a high severity security update according to Google advisory. The update is required to fix multiple unspecified vulnerabilities. The flaws are present in the application, which fails to properly handle certain vectors. Successful exploitation could allow attackers to cause a denial of service, possibly have other impact or conduct UXSS attacks.
The host is installed with Google Chrome before 33.0.1750.149 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to properly handle certain utterance data structure. Successful exploitation could allow attackers to cause a denial of service or possibly have unspecified other impact.
The host is installed with Google Chrome before 33.0.1750.149 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to properly handle certain utterance data structure. Successful exploitation could allow attackers to cause a denial of service or possibly have unspecified other impact.
The host is installed with Google Chrome before 33.0.1750.149 and is prone to a universal XSS vulnerability. A flaw is present in the GenerateFunction function in bindings/scripts/code_generator_v8.pm in blink, which fails to properly handle vectors involving events. Successful exploitation could allow attackers to conduct universal XSS (UXSS) attacks via vectors involving events.
The host is installed with Google Chrome before 33.0.1750.149 and is prone to a universal XSS vulnerability. A flaw is present in the GenerateFunction function in bindings/scripts/code_generator_v8.pm in blink, which fails to properly handle vectors involving events. Successful exploitation could allow attackers to conduct universal XSS (UXSS) attacks via vectors involving events.
The host is installed with Google Chrome before 33.0.1750.149 and is prone to a use-after-free vulnerability. A flaw is present in the web database, which fails to properly handle scheduled tasks during shutdown of a thread. Successful exploitation could allow attackers to cause a denial of service or possibly have unspecified other impact.
The host is installed with Google Chrome before 33.0.1750.149 and is prone to a use-after-free vulnerability. A flaw is present in the web database, which fails to properly handle scheduled tasks during shutdown of a thread. Successful exploitation could allow attackers to cause a denial of service or possibly have unspecified other impact.
The host is installed with Google Chrome before 33.0.1750.149 and is prone to an use-after-free vulnerability. A flaw is present in the web sockets, which fails to properly handle an incorrect deletion in a certain failure case. Successful exploitation could allow attackers to bypass the sandbox protection mechanism.
The host is installed with Google Chrome before 33.0.1750.149 and is prone to an use-after-free vulnerability. A flaw is present in the web sockets, which fails to properly handle an incorrect deletion in a certain failure case. Successful exploitation could allow attackers to bypass the sandbox protection mechanism.
The host is installed with Google Chrome before 33.0.1750.149 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to handle unknown vectors. Successful exploitation could allow attackers to cause a denial of service or possibly have other impact.