The host is installed with Google Chrome before 40.0.2214.91 and is prone to a denial of service vulnerability. A flaw is present in the application, which does not properly handle arrays with holes. Successful exploitation could allow attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact.
The host is installed with Google Chrome before 40.0.2214.91 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle vectors involving movement of a SCRIPT element across documents. Successful exploitation could allow attackers to cause a denial of service or possibly have unspecified other impact.
The host is installed with Google Chrome before 40.0.2214.91 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle a crafted JavaScript code that triggers improper maintenance of TreeScope data. Successful exploitation could allow attackers to cause a denial of service or possibly have unspecified other impact.
The host is installed with Google Chrome before 40.0.2214.91 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle vectors involving pending updates of detached elements. Successful exploitation could allow attackers to cause a denial of service or possibly have unspecified other impact.
The host is installed with Google Chrome before 40.0.2214.91 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle a crafted Matroska file that triggers improper maintenance of tracks data. Successful exploitation could allow attackers to cause a denial of service or possibly have unspecified other impact.
The host is installed with Google Chrome before 40.0.2214.91 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle vectors related to unexpected absence of document data structures. Successful exploitation could allow attackers to cause a denial of service or possibly have unspecified other impact.
The host is installed with Google Chrome before 40.0.2214.91 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle vectors involving utterances from a closed tab. Successful exploitation could allow attackers to cause a denial of service or possibly have unspecified other impact.
The host is installed with Google Chrome before 40.0.2214.91 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle a crafted document that triggers improper maintenance of a zoom bubble. Successful exploitation could allow attackers to cause a denial of service or possibly have unspecified other impact.
The host is installed with Google Chrome before 40.0.2214.91 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted JavaScript code that triggers improper maintenance of backing-store pointers. Successful exploitation could allow attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact.
The host is installed with Google Chrome before 40.0.2214.91 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle a crafted Vorbis I data. Successful exploitation could allow attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.