The host is installed with Google Chrome before 116.0.5845.96 or Microsoft Edge before 116.0.1938.54 and is prone to an use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.