The host is installed with Google Chrome before 115.0.5790.98 or Microsoft Edge before 115.0.1901.183 and is prone to a inappropriate implementation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.