The host is installed with Google Chrome before 49.0.2623.75 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to block installations upon deletion of an installation frame. Successful exploitation allows remote attackers to trick a user into believing that an installation request originated from the user's next navigation target via a crafted web site ...