The host is installed with Google Chrome before 26.0.1410.43 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly enforce the use of separate processes. Successful exploitation could allow remote attackers to bypass intended access restrictions.