The host is installed with Google Chrome, and is prone to a cross site scripting vulnerability. A flaw is present in the browser, as it fails to validate user supplied data before inserting it into extensions. Successful exploitation could allow an attacker to inject arbitrary script.