The host is installed with Google Chrome before 86.0.4240.75 or Microsoft Edge Chromium before 86.0.622.38 and is prone to an inappropriate implementation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.