The host is installed with Google Chrome before 28.0.1500.71 and is prone to multiple unspecified vulnerabilities. The flaws are present in the application, which does not properly prevent pop-under windows. Successful exploitation allows remote attackers to have an unspecified impact.