The host is installed with Google Chrome before 28.0.1500.71 and is prone to multiple unspecified vulnerabilities. The flaws are present in the application, which does not ensure a sufficient source of entropy for renderer processes. Successful exploitation allows remote attackers to defeat cryptographic protection mechanisms in third-party components via unspecified vectors.