The host is installed with Google Chrome before 102.0.5005.61 or Microsoft Edge Chromium before 102.0.1245.30 and is prone to an inappropriate implementation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.