The host is installed with Google Google Chrome before 83.0.4103.61 or Edge Chromium before 83.0.478.37 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.