Google has recently deployed updates to mitigate a newly discovered zero-day vulnerability in their Chrome browser, which is currently being actively exploited.
Google has acknowledged its awareness of an exploit currently available for CVE-2023-5217, which has been observed to be actively exploited in real-world scenarios.
The latest version of Google Chrome, namely 117.0.5938.132, has been released for the Windows, Mac, and Linux operating systems. This update primarily focuses on addressing a security vulnerability. The forthcoming update will be released in the upcoming days and weeks.
This update encompasses a total of ten security fixes. Three security issues were assigned a ‘High severity’ rating.
Implementing AI-Powered Email security solutions “Trustifi” can secure your business from today’s most dangerous email threats, such as Email Tracking, Blocking, Modifying, Phishing, Account Take Over, Business Email Compromise, Malware & Ransomware
The identified vulnerability, designated as CVE-2023-5217, pertains to a Heap buffer overflow within the vp8 encoding functionality of the libvpx library. This flaw has been classified as high severity. The report was authored by Clément Lecigne, a member of Google’s Threat Analysis Group, and was published on September 25, 2023.
Such buffer overflow flaws can be exploited to cause software crashes or the execution of arbitrary code, affecting the program’s availability and integrity.
A high-severity flaw, identified as CVE-2023-5186, has been discovered. This flaw, known as “Use after free in Passwords,” poses a significant risk. In a report by [pwn2car], it has been revealed.
A High-severity vulnerability tracked as CVE-2023-5187, Use after free in Extensions. Reported by Thomas Orlita and compensated with a $2000 reward.
To reduce potential risks, users are advised to update to Chrome version 117.0.5938.132 for Windows, macOS, and Linux.
As soon as the fixes become available, users of Chromium-based browsers like Microsoft Edge, Brave, Opera, and Vivaldi are encouraged to install them.
Protect yourself from vulnerabilities using Patch Manager Plus to quickly patch over 850 third-party applications. Take advantage of the free trial to ensure 100% security.
A recently disclosed vulnerability in Docusnap's Windows client software (CVE-2025-26849) enables attackers to decrypt sensitive…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2018-8639, a decade-old Microsoft Windows privilege…
Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under limited,…
A critical vulnerability in BigAntSoft's enterprise chat server software has exposed ~50 internet-facing systems to…
With the growing importance of security compliance for startups, more companies are seeking to achieve…
Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass authentication…