Posts Tagged ‘Google Chrome’

Google Chrome and Mozilla products

Google Chrome and Mozilla products

Vulnerability: System compromise in Google Chrome

Danger level: High
Patch: Yes
Number of vulnerabilities: 1

CVE ID: CVE-2013-0912
Vector of operation: Remote
Impact: System Compromise

Affected products: Google Chrome 25.x
Affected versions: Google Chrome 25.C

Description:

Which can be exploited by malicious people to compromise a vulnerable system.
An error such as confusion in WebKit. A remote user can bypass the sandbox and execute arbitrary code on the target system.
Solution: To resolve the vulnerability patch from the manufacturer. (more…)

Vulnerability

Vulnerabilities in Google Chrome

Vulnerability: Multiple vulnerabilities in Google Chrome

Danger: High
Patch: Yes
Number of vulnerabilities: 9

CVE ID: CVE-2012-5139, CVE-2012-5140, CVE-2012-5141, CVE-2012-5142, CVE-2012-5143, CVE-2012-5144, CVE-2012-5676, CVE-2012-5677, CVE-2012-5678

Vector of operation: Remote
Impact: Security Bypass, System compromise

Affected products: Google Chrome 23.x

Affected versions: Google Chrome to version 23.0.1271.97.

Description:

The vulnerability allows a remote user to execute arbitrary code on the target system.

1. The vulnerability is caused due to some errors in the embedded Adobe Flash Player. This can be exploited to compromise a vulnerable system. (more…)

Google Chrome

System compromise

Vulnerability: System compromise in Google Chrome

Danger: High
Patch: Yes
Number of vulnerabilities: 5

CVE ID: CVE-2012-5130
CVE-2012-5131
CVE-2012-5132
CVE-2012-5133
CVE-2012-5134
CVE-2012-5135
CVE-2012-5136

Vector of operation: Remote
Impact: System Compromise

Affected products: Google Chrome 23.x

Affected versions: Google Chrome to version 23.0.1271.91.

Description:

The vulnerability allows a remote user to execute arbitrary code on the target system. (more…)

Google Chrome

Denial of service in Google Chrome

Vulnerability: Denial of service in Google Chrome

Danger: High
Patch: Yes
Quantity of vulnerabilities: 19

Impact: Security Bypass
System compromise

Affected products: Google Chrome 22.x

Affected versions: Google Chrome versions prior to 23.0.1271.64

CVE ID: CVE-2012-5127, CVE-2012-5120, CVE-2012-5118, CVE-2012-5117, CVE-2012-5119, CVE-2012-5122, CVE-2012-5123, CVE-2012-5124, CVE-2012-5125, CVE-2012-5126, CVE-2012-5128 (more…)

Google ChromeVulnerability: Multiple vulnerabilities in Google Chrome

Danger: High
Patch: Yes
Number of vulnerabilities: 2
CVE ID: CVE-2012-5112
Impact: Security Bypass, system compromise
Affected products: Google Chrome 22.x

Affected versions: Google Chrome to version 22.0.1229.94 (more…)

internet explorer logoAccording to a study web-browser from Microsoft three times surpassed its nearest rival Google Chrome.

The company NSS Labs has tested the popular web-browsers. It was found that the most secure browser was named Internet Explorer, which is being developed by Microsoft.

The experts found that IE better protect users from malware than other browsers. According to a study by research firm NSS Labs, web-browser IE three times surpassed its nearest rival Google Chrome. (more…)

Google ChromeAffected versions: Google Chrome to version 21.0.1180.89.

Description:

Which can be exploited by malicious people to bypass certain security restrictions, to make XSS attacks and compromise a vulnerable system.

1. An error reading data outside the buffer. This can be exploited to gain access to potentially sensitive information.

2. The vulnerability is caused due to an error bad_cast. This can be exploited to compromise a vulnerable system.

3. An error in the processing of the operation status XMLHttpRequest calls. This can be exploited to gain access to potentially sensitive information. (more…)

Warning VirusesDevelopers of browsers Google Chrome and Opera have released security fixes

Vulnerabilities found in popular web-browsers allow to execute arbitrary code on the target system.

Google development team has released a security update for its web-browser Chrome. Update closes six vulnerabilities, three of which allow an attacker to remotely execute arbitrary code on the target system.

As part of the remuneration independent researchers, the company paid $ 3.5 to external experts for the detection of thousands of data breaches. (more…)