The host is installed with Google Chrome before 106.0.5249.61 or Microsoft Edge Chromium before 106.0.1370.34 and is prone to an insufficient validation of untrusted vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.