Wednesday, February 26, 2025
HomeChromeChrome 74 Released with the Fix for 39 Security Vulnerabilities

Chrome 74 Released with the Fix for 39 Security Vulnerabilities

Published on

SIEM as a Service

Follow Us on Google News

Chrome 74 released with a fix for numerous security Vulnerabilities and new features, the update available for Windows, Mac, and Linux desktop users.

This update includes 39 security fixes, out of the 12 vulnerabilities discovered by external security researchers.

The vulnerability reported by external security researchers includes 5 are high-risk vulnerabilities, 12 medium security severity flaws, and 2 Low severity issues.

High-risk vulnerabilities include CVE-2019-5805: Use after free in PDFium, CVE-2019-5806: Integer overflow in Angle, CVE-2019-5807: Memory corruption in V8 and CVE-2019-5808: Use after free in Blink.

The update fixes 12 medium security severity flaws, that includes CVE-2019-5810: User information disclosure in Autofill, CVE-2019-5811: CORS bypass in Blink, CVE-2019-5812: URL spoof in Omnibox on iOS and CVE-2019-5813: Out of bounds read in V8.

It fixes other issues like CVE-2019-5814: CORS bypass in Blink, CVE-2019-5815: Heap buffer overflow in Blink, CVE-2019-5816: Exploit persistence extension on Android, CVE-2019-5817: Heap buffer overflow in Angle on Windows, CVE-2019-5818: Uninitialized value in media reader, CVE-2019-5819: Incorrect escaping in developer tools, CVE-2019-5820: Integer overflow in PDFium and CVE-2019-5821: Integer overflow in PDFium.

The Low-level security flaws that include CVE-2019-5822: CORS bypass in download manager and CVE-2019-5823: Forced navigation from a service worker. The latest version of chrome is Version 74.0.3729.108, reads Chrome blog post.

Chrome 74

Along with security fixes, the update also brings some new features to Chrome, the data saver in Chrome is renamed as Lite mode and also it brings dark mode which automatically synchronizes based on Windows 10’s color settings.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Chrome 72 Released with 58 Security fixes, Removes HPKP and Deprecate TLS 1.0 and 1.1

Google Chrome to Show Not Secure For HTTP Sites and Fix for 42 Security Issues

A Chrome Bug Allowed Hackers to Extract Your Private Data From Facebook and Other Web Platforms

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

GRUB2 Flaws Expose Millions of Linux Devices to Exploitation

A critical set of 20 security vulnerabilities in GRUB2, the widely used bootloader for...

Orange Communication Breached – Hackers Allegedly Claim 380,000 Email Records Exposed

Telecommunications provider Orange Communication faces a potential data breach after a threat actor using the pseudonym “Rey”...

RSync Vulnerabilities Allow Hackers to Take Full Control of Servers – PoC Released

A series of critical security vulnerabilities in the widely-used Rsync file synchronization tool have...

Millions of WordPress Websites Vulnerable to Script Injection Due to Plugin Flaw

A critical security vulnerability in the Essential Addons for Elementor plugin, installed on over 2 million...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Widespread Chrome Malware: 16 Extensions Infect Over 3.2 Million Users

A recent cybersecurity investigation has uncovered a cluster of 16 malicious Chrome extensions that...

Fake Chrome Update Delivers DriverEasy Malware by Abusing Dropbox

A recent investigation has uncovered a malicious application, DriverEasy, masquerading as a legitimate Google...

Chrome Buffer Overflow Flaws Let Hackers Execute Arbitrary Code & Gain System Access

Google has rolled out an urgent security update for its Chrome browser, patching three...