The host is installed with Google Chrome before 45.0.2454.85 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a crafted (1) app or (2) extension. Successful exploitation allows user-assisted remote attackers to bypass intended access restrictions.