The host is installed with Google Chrome before 27.0.1453.93 and is prone to multiple cross-site scripting (XSS) vulnerabilities. The flaws are present in the application, which fails to handle vectors involving a drag-and-drop or copy-and-paste operation. Successful exploitation allows attackers to inject arbitrary web script or HTML.
The host is installed with Google Chrome before 27.0.1453.93 and is prone to use-after-free vulnerability. A flaw is present in the application, which fails to handle the workers implementation. Successful exploitation allows attackers to cause a denial of service.
The host is installed with Google Chrome before 27.0.1453.93 and is prone to use-after-free vulnerability. A flaw is present in the application, which fails to handle the media loader. Successful exploitation allows attackers to cause a denial of service or possibly have unspecified other impact.
The host is installed with Google Chrome before 27.0.1453.93 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to handle the Web Audio implementation. Successful exploitation allows attackers to cause a denial of service.
The host is installed with Google Chrome before 27.0.1453.93 and is prone to use-after-free vulnerability. A flaw is present in the application, which fails to handle vectors related to style resolution. Successful exploitation allows attackers to cause a denial of service or possibly have unspecified other impact.
The host is installed with Google Chrome before 27.0.1453.93 and is prone to use-after-free vulnerability. A flaw is present in the application, which fails to handle vectors related to the handling of speech data. Successful exploitation allows attackers to cause a denial of service or possibly have unspecified other impact.
The host is installed with Google Chrome before 27.0.1453.93 and is prone to use-after-free vulnerability. A flaw is present in the application, which fails to handle vectors related to the handling of Pepper resources. Successful exploitation allows attackers to cause a denial of service or possibly have unspecified other impact.
The host is installed with Google Chrome before 27.0.1453.93 and is prone to use-after-free vulnerability. A flaw is present in the application, which fails to handle the media loader. Successful exploitation allows attackers to cause a denial of service or possibly have unspecified other impact.
The host is installed with Google Chrome before 27.0.1453.93 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly perform a cast of an unspecified variable during handling of clipboard data. Successful exploitation allows attackers to cause a denial of service or possibly have other impact.
The host is installed with Google Chrome before 27.0.1453.93 and is prone to out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle certain unspecified vectors. Successful exploitation allows attackers to cause a denial of service.