The host is installed with Google Chrome before 81.0.4044.122 or Chromium-based Edge before 81.0.416.64 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.