The host is installed with Google Chrome before 85.0.4183.121 or Microsoft Edge Chromium before 85.0.564.63 and is prone to an insufficient data validation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.