• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
update google chrome asap to patch 2 new actively exploited

Update Google Chrome ASAP to Patch 2 New Actively Exploited Zero-Day Flaws

You are here: Home / General Cyber Security News / Update Google Chrome ASAP to Patch 2 New Actively Exploited Zero-Day Flaws
October 1, 2021

Google on Thursday pushed urgent security fixes for its Chrome browser, which includes a pair of two new security weaknesses that the organization stated are remaining exploited in the wild, creating them the fourth and fifth actively zero-days plugged this thirty day period on your own.

The issues, developed as CVE-2021-37975 and CVE-2021-37976, are part of a whole of four patches, and problem a use-just after-no cost flaw in V8 JavaScript and WebAssembly motor as very well as an details leak in main.

As is generally the case, the tech large has refrained from sharing any further information with regards to how these zero-day vulnerabilities have been applied in attacks until finally a majority of end users are up to date with the patches, but pointed out that it really is knowledgeable that “exploits for CVE-2021-37975 and CVE-2021-37976 exist in the wild.”

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Automatic GitHub Backups

An nameless researcher has been credited with reporting CVE-2021-37975. The discovery of CVE-2021-37976, on the other hand, involves Clément Lecigne from Google Risk Assessment Group, who was also credited with CVE-2021-37973, an additional actively exploited use-soon after-no cost vulnerability in Chrome’s Portals API that was noted last week, increasing the probability that the two flaws may possibly have been stringed collectively as portion of an exploit chain to execute arbitrary code.

With the latest update, Google has dealt with a record 14 zero-times in the web browser considering that the start out of the yr.

  • CVE-2021-21148 – Heap buffer overflow in V8
  • CVE-2021-21166 – Item recycle issue in audio
  • CVE-2021-21193 – Use-following-free of charge in Blink
  • CVE-2021-21206 – Use-after-free in Blink
  • CVE-2021-21220 – Insufficient validation of untrusted enter in V8 for x86_64
  • CVE-2021-21224 – Type confusion in V8
  • CVE-2021-30551 – Type confusion in V8
  • CVE-2021-30554 – Use-soon after-absolutely free in WebGL
  • CVE-2021-30563 – Kind confusion in V8
  • CVE-2021-30632 – Out of bounds compose in V8
  • CVE-2021-30633 – Use-right after-absolutely free in Indexed DB API
  • CVE-2021-37973 – Use-just after-cost-free in Portals

Chrome buyers are recommended to update to the latest variation (94..4606.71) for Windows, Mac, and Linux by heading to Configurations > Support > ‘About Google Chrome’ to mitigate any opportunity risk of active exploitation.

Located this post exciting? Stick to THN on Facebook, Twitter  and LinkedIn to study much more exclusive content material we put up.


Some parts of this write-up are sourced from:
thehackernews.com

Previous Post: «google emergency update fixes two chrome zero days Google Emergency Update Fixes Two Chrome Zero Days
Next Post: Beware of Fake Amnesty International Antivirus for Pegasus that Hacks PCs with Malware beware of fake amnesty international antivirus for pegasus that hacks»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.