The host is installed with Google Chrome before 89.0.4389.72 or Edge Chromium before 89.0.774.45 and is prone to a remote code vulnerability. A flaw is present in the application, which fails to handle object lifetime. Successful exploitation allows attackers to execute arbitrary code on the system.