{"id":1596,"date":"2021-01-15T22:20:25","date_gmt":"2021-01-16T03:20:25","guid":{"rendered":"https:\/\/truxgoservers.com\/blog\/?p=1596"},"modified":"2021-01-15T22:20:26","modified_gmt":"2021-01-16T03:20:26","slug":"vulnerabilities-faced-by-google-chrome","status":"publish","type":"post","link":"https:\/\/truxgoservers.com\/blog\/vulnerabilities-faced-by-google-chrome\/","title":{"rendered":"Vulnerabilities faced by Google Chrome"},"content":{"rendered":"\n<p>Google Chrome is without a doubt the most widely used web browser in the world, even superior to Internet Explorer. And it is because of this that mainly due to its success, this browser is in the crosshairs of hackers and users who seek to use it with malicious intentions, so it is Google&#8217;s responsibility to anticipate them by detecting and fixing all security flaws before that other people detect them and decide, for example, to sell them on the Deep Web to the highest bidder.<\/p>\n\n\n\n<p>Something you should know is that the vulnerabilities are related to the incorrect management of memory, especially in its addresses, leaving the doors open for attacks on the internal components of the browser.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">High level critical vulnerabilities in Google Chrome<\/h2>\n\n\n\n<p>Although it is common to find new security breaches in popular computer tools, it is always better to take precautionary measures and thus combat the severity of them and the need to update the browser as soon as possible.<\/p>\n\n\n\n<p><strong><em>\u25b8CVE-2021-21112 &#8211; CVSSv3: 7.7<\/em><\/strong><\/p>\n\n\n\n<p>The vulnerability allows a remote attacker to compromise the vulnerable system. This exists due to a post-release usage bug within the Blink component in Google Chrome.<\/p>\n\n\n\n<p><strong><em>\u25b8CVE-2020-16043 &#8211; CVSSv3: 7.7<\/em><\/strong><\/p>\n\n\n\n<p>The vulnerability exists due to incorrect input validation on networks in Google Chrome. A remote attacker can trick the victim into visiting a specially crafted web page and executing arbitrary code on the system.<\/p>\n\n\n\n<p><strong><em>\u25b8CVE-2021-21115 &#8211; CVSSv3: 7.7<\/em><\/strong><\/p>\n\n\n\n<p>The vulnerability allows a remote attacker to compromise the vulnerable system. This exists due to a post-release usage error within the Safe Browsing component in Google Chrome.<\/p>\n\n\n\n<p><strong><em>\u25b8CVE-2020-15995 &#8211; CVSSv3: 7.7<\/em><\/strong><\/p>\n\n\n\n<p>The vulnerability exists due to a boundary bug when processing untrusted input in V8.<\/p>\n\n\n\n<p><strong><em>\u25b8CVE-2021-21111- CVSSv3: 7.7<\/em><\/strong><\/p>\n\n\n\n<p>The vulnerability exists due to insufficient policy enforcement in WebUI in Google Chrome. A remote attacker can trick the victim into visiting a specially crafted website, circumvent implemented security measures, and compromise the affected system.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google Chrome is without a doubt the most widely used web browser in the world, even superior to Internet Explorer. And it is because of this that mainly due to its success, this browser is in the crosshairs of hackers and users who seek to use it with malicious intentions, so it is Google&#8217;s responsibility [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1597,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[36,260,197],"class_list":["post-1596","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cybersecurity","tag-googlechrome","tag-vulnerabilities"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Vulnerabilities faced by Google Chrome - Truxgo Server Blog<\/title>\n<meta name=\"description\" content=\"Google Chrome is the most used browser on the world, so criminals target this platform and take advantage of it if vulnerabilities arise....\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/truxgoservers.com\/blog\/vulnerabilities-faced-by-google-chrome\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerabilities faced by Google Chrome - Truxgo Server Blog\" \/>\n<meta property=\"og:description\" content=\"Google Chrome is the most used browser on the world, so criminals target this platform and take advantage of it if vulnerabilities arise....\" \/>\n<meta property=\"og:url\" content=\"https:\/\/truxgoservers.com\/blog\/vulnerabilities-faced-by-google-chrome\/\" \/>\n<meta property=\"og:site_name\" content=\"Truxgo Server Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-16T03:20:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-16T03:20:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/01\/Alert.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"680\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Truxgo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Truxgo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/vulnerabilities-faced-by-google-chrome\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/vulnerabilities-faced-by-google-chrome\\\/\"},\"author\":{\"name\":\"Truxgo\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/person\\\/8b409c26449db6aa09724b45331e333e\"},\"headline\":\"Vulnerabilities faced by Google Chrome\",\"datePublished\":\"2021-01-16T03:20:25+00:00\",\"dateModified\":\"2021-01-16T03:20:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/vulnerabilities-faced-by-google-chrome\\\/\"},\"wordCount\":327,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/vulnerabilities-faced-by-google-chrome\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/Alert.jpg\",\"keywords\":[\"Cybersecurity\",\"GoogleChrome\",\"Vulnerabilities\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/vulnerabilities-faced-by-google-chrome\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/vulnerabilities-faced-by-google-chrome\\\/\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/vulnerabilities-faced-by-google-chrome\\\/\",\"name\":\"Vulnerabilities faced by Google Chrome - Truxgo Server Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/vulnerabilities-faced-by-google-chrome\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/vulnerabilities-faced-by-google-chrome\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/Alert.jpg\",\"datePublished\":\"2021-01-16T03:20:25+00:00\",\"dateModified\":\"2021-01-16T03:20:26+00:00\",\"description\":\"Google Chrome is the most used browser on the world, so criminals target this platform and take advantage of it if vulnerabilities arise....\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/vulnerabilities-faced-by-google-chrome\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/vulnerabilities-faced-by-google-chrome\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/vulnerabilities-faced-by-google-chrome\\\/#primaryimage\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/Alert.jpg\",\"contentUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/Alert.jpg\",\"width\":1100,\"height\":680},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/vulnerabilities-faced-by-google-chrome\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerabilities faced by Google Chrome\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\",\"name\":\"Truxgo Server Blog\",\"description\":\"Cloud Server and Hosting Tutorials.\",\"publisher\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\",\"name\":\"Truxgo Server Blog\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/cropped-truxgo-logo-blanco.png\",\"contentUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/cropped-truxgo-logo-blanco.png\",\"width\":1250,\"height\":278,\"caption\":\"Truxgo Server Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/person\\\/8b409c26449db6aa09724b45331e333e\",\"name\":\"Truxgo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"caption\":\"Truxgo\"},\"sameAs\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\"],\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/author\\\/truxgo\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerabilities faced by Google Chrome - Truxgo Server Blog","description":"Google Chrome is the most used browser on the world, so criminals target this platform and take advantage of it if vulnerabilities arise....","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/truxgoservers.com\/blog\/vulnerabilities-faced-by-google-chrome\/","og_locale":"es_MX","og_type":"article","og_title":"Vulnerabilities faced by Google Chrome - Truxgo Server Blog","og_description":"Google Chrome is the most used browser on the world, so criminals target this platform and take advantage of it if vulnerabilities arise....","og_url":"https:\/\/truxgoservers.com\/blog\/vulnerabilities-faced-by-google-chrome\/","og_site_name":"Truxgo Server Blog","article_published_time":"2021-01-16T03:20:25+00:00","article_modified_time":"2021-01-16T03:20:26+00:00","og_image":[{"width":1100,"height":680,"url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/01\/Alert.jpg","type":"image\/jpeg"}],"author":"Truxgo","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Truxgo","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/truxgoservers.com\/blog\/vulnerabilities-faced-by-google-chrome\/#article","isPartOf":{"@id":"https:\/\/truxgoservers.com\/blog\/vulnerabilities-faced-by-google-chrome\/"},"author":{"name":"Truxgo","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/person\/8b409c26449db6aa09724b45331e333e"},"headline":"Vulnerabilities faced by Google Chrome","datePublished":"2021-01-16T03:20:25+00:00","dateModified":"2021-01-16T03:20:26+00:00","mainEntityOfPage":{"@id":"https:\/\/truxgoservers.com\/blog\/vulnerabilities-faced-by-google-chrome\/"},"wordCount":327,"commentCount":1,"publisher":{"@id":"https:\/\/truxgoservers.com\/blog\/#organization"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/vulnerabilities-faced-by-google-chrome\/#primaryimage"},"thumbnailUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/01\/Alert.jpg","keywords":["Cybersecurity","GoogleChrome","Vulnerabilities"],"articleSection":["Cybersecurity"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/truxgoservers.com\/blog\/vulnerabilities-faced-by-google-chrome\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/truxgoservers.com\/blog\/vulnerabilities-faced-by-google-chrome\/","url":"https:\/\/truxgoservers.com\/blog\/vulnerabilities-faced-by-google-chrome\/","name":"Vulnerabilities faced by Google Chrome - Truxgo Server Blog","isPartOf":{"@id":"https:\/\/truxgoservers.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/truxgoservers.com\/blog\/vulnerabilities-faced-by-google-chrome\/#primaryimage"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/vulnerabilities-faced-by-google-chrome\/#primaryimage"},"thumbnailUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/01\/Alert.jpg","datePublished":"2021-01-16T03:20:25+00:00","dateModified":"2021-01-16T03:20:26+00:00","description":"Google Chrome is the most used browser on the world, so criminals target this platform and take advantage of it if vulnerabilities arise....","breadcrumb":{"@id":"https:\/\/truxgoservers.com\/blog\/vulnerabilities-faced-by-google-chrome\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/truxgoservers.com\/blog\/vulnerabilities-faced-by-google-chrome\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/truxgoservers.com\/blog\/vulnerabilities-faced-by-google-chrome\/#primaryimage","url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/01\/Alert.jpg","contentUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/01\/Alert.jpg","width":1100,"height":680},{"@type":"BreadcrumbList","@id":"https:\/\/truxgoservers.com\/blog\/vulnerabilities-faced-by-google-chrome\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/truxgoservers.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Vulnerabilities faced by Google Chrome"}]},{"@type":"WebSite","@id":"https:\/\/truxgoservers.com\/blog\/#website","url":"https:\/\/truxgoservers.com\/blog\/","name":"Truxgo Server Blog","description":"Cloud Server and Hosting Tutorials.","publisher":{"@id":"https:\/\/truxgoservers.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/truxgoservers.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/truxgoservers.com\/blog\/#organization","name":"Truxgo Server Blog","url":"https:\/\/truxgoservers.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/08\/cropped-truxgo-logo-blanco.png","contentUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/08\/cropped-truxgo-logo-blanco.png","width":1250,"height":278,"caption":"Truxgo Server Blog"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/person\/8b409c26449db6aa09724b45331e333e","name":"Truxgo","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","caption":"Truxgo"},"sameAs":["https:\/\/truxgoservers.com\/blog"],"url":"https:\/\/truxgoservers.com\/blog\/author\/truxgo\/"}]}},"_links":{"self":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/1596","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/comments?post=1596"}],"version-history":[{"count":1,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/1596\/revisions"}],"predecessor-version":[{"id":1598,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/1596\/revisions\/1598"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/media\/1597"}],"wp:attachment":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/media?parent=1596"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/categories?post=1596"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/tags?post=1596"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}