• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
update‌ ‌your chrome browser to patch yet another 0 day exploit‌ed

Update‌ ‌Your Chrome Browser to Patch Yet Another 0-Day Exploit‌ed ‌in‌-the‌-Wild

You are here: Home / General Cyber Security News / Update‌ ‌Your Chrome Browser to Patch Yet Another 0-Day Exploit‌ed ‌in‌-the‌-Wild
June 18, 2021

Google has rolled out however yet another update to Chrome browser for Windows, Mac, and Linux to take care of four security vulnerabilities, including a person zero-day flaw that is getting exploited in the wild.

Tracked as CVE-2021-30554, the higher severity flaw fears a use immediately after cost-free vulnerability in WebGL (aka Web Graphics Library), a JavaScript API for rendering interactive 2D and 3D graphics in just the browser.

Stack Overflow Teams

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Profitable exploitation of the flaw could signify corruption of valid details, main to a crash, and even execution of unauthorized code or commands.

The issue was reported to Google anonymously on June 15, Chrome technological system manager Srinivas Sista noted, introducing the organization is “knowledgeable that an exploit for CVE-2021-30554 exists in the wild.”

Even though it’s commonly the norm to limit information of the vulnerability until finally a the greater part of customers are up to date with the fix, the progress comes fewer than 10 times right after Google addressed a different zero-day vulnerability exploited in lively attacks (CVE-2021-30551).

CVE-2021-30554 is also the eighth zero-day flaw patched by Google considering the fact that the begin of the 12 months.

Prevent Ransomware Attacks

“I am delighted we are getting improved at detecting these exploits and the wonderful partnerships we have to get the vulnerabilities patched, but I continue to be anxious about how many are currently being learned on an ongoing basis and the position of professional vendors,” tweeted Shane Huntley, Director of Google’s Danger Examination Team, on June 8.

Chrome people are suggested to update to the most current variation (91..4472.114) by heading to Settings > Aid > ‘About Google Chrome’ to mitigate the risk linked with the flaw.

Observed this write-up interesting? Adhere to THN on Facebook, Twitter  and LinkedIn to go through far more special material we write-up.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «carnival discloses new data breach on email accounts Carnival discloses new data breach on email accounts
Next Post: [eBook] 7 Signs You Might Need a New Detection and Response Tool [ebook] 7 signs you might need a new detection and»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts

Copyright © TheCyberSecurity.News, All Rights Reserved.