CERT-In, India’s cyber security watchdog, has discovered several vulnerabilities in the widely-used Google Chrome operating system. These vulnerabilities have the ability to bypass security measures on the targeted system.
According to a CERT-In advisory, attackers can exploit vulnerabilities to run unauthorized code, cause a denial of service, and bypass security on targeted systems.
By infosecbulletin
/ Thursday , July 4 2024
Microsoft's cybersecurity team found two major vulnerabilities in Rockwell Automation's PanelView Plus, a widely used human-machine interface in industrial settings....
Read More
By infosecbulletin
/ Thursday , July 4 2024
Cybersecurity experts found 28 new types of ransomware in June. These malicious programs are a big threat to individuals and...
Read More
By infosecbulletin
/ Wednesday , July 3 2024
ISACA Dhaka Chapter election is going to be held on Saturday (6 July) 2024. This year 23 candidates will fight...
Read More
By infosecbulletin
/ Wednesday , July 3 2024
Google launched a new bug bounty program called kvmCTF to enhance the security of its Kernel-based Virtual Machine (KVM) hypervisor....
Read More
By infosecbulletin
/ Tuesday , July 2 2024
The Brain Cipher ransomware group to release the decryption keys for Indonesia Terkoneksi on Wednesday. They said their attack aims...
Read More
By infosecbulletin
/ Tuesday , July 2 2024
"A critical vulnerability has been identified in the Google Authentication mechanism of the application. By manipulating the ID and email...
Read More
By infosecbulletin
/ Tuesday , July 2 2024
The Apache Software Foundation has found multiple security issues in the widely used Apache HTTP Server. These vulnerabilities could lead...
Read More
By infosecbulletin
/ Tuesday , July 2 2024
An executive from National Australia Bank reveals that the four major banks in the country face continuous attacks, as threat...
Read More
By infosecbulletin
/ Monday , July 1 2024
There is a security flaw (CVE-2024-20399) in Cisco NX-OS Software that lets an attacker with local access execute commands as...
Read More
By infosecbulletin
/ Monday , July 1 2024
Despite the limited manpower and various limitations, efforts are being made to keep the country's cyber space safe, said the...
Read More
ALSO READ:
Microsoft November 2023 Patch fixes 5 zero-days, 58 flaws
“These vulnerabilities exist in Google Chrome OS due to use after free in profiles, inappropriate implementation in downloads, heap buffer overflow in pdf and issue in Linux Kernel. An attacker could exploit these vulnerabilities by persuading a victim to visit a specially-crafted request on the targeted system.”
CERT-In regularly identifies vulnerabilities in devices and operating systems and publicly warns users and companies about them.