The host is installed with Google Chrome before 31.0.1650.48 and is prone to an use-after-free vulnerability. The flaw is present in application, which fails to properly handle the id attribute strings. Successful exploitation allows remote attackers to cause a use-after-free vulnerability.