The host is installed with Google Chrome before 10.0.648.127 or Apple Safari less than or equal to 5.0.5 and is prone to same origin bypass vulnerability. A flaw is present in the applications, which fails to handle an error message leak. Successful exploitation allow remote attackers to bypass the same origin policy via unspecified vectors, related to an "error message leak".