Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » New Chrome vulnerability allows for a cross -out data leak through a forklift policy
Global Security

New Chrome vulnerability allows for a cross -out data leak through a forklift policy

AdminBy AdminMay 15, 2025No Comments2 Mins Read
New Chrome Vulnerability
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


May 15, 2025Red LakshmananBrowser’s safety / safety online

A new chrome vulnerability

Google on Wednesday liberated Updates to resolve four security issues in your Chrome web browser, including one for which it is said, exists in the wild.

Vulnerability at high speed, tracked as Cve-2025-4664 (CVSS assessment: 4.3), characterized as a case of insufficient policy implementation in a component called Loader.

“Insufficient implementation of a policy in Google Chrome forking up to 136.0.7103.113 allowed a remote attacker to leak data of crossed origin through the created HTML page,” A description deficiency.

The technical giant attributed to the VSEVolod Kokorin (@slonser_) security researcher with a detail of the lack of May 5, 2025, adding that there was a “feat for Cve-2025-464” in the wild.

Cybersecurity

“Unlike other browsers, Chrome decides the title of references to the resource,” Kokorin – Note In a series of posts on X previously this month. “The problem is that the link title can set the abstract.

The researcher continued to add that the request parameters may contain sensitive data that could lead to a complete absorption account and that the request parameter information could be stolen through a third party resource image.

It is unclear whether the vulnerability was used in the malicious context outside this demonstration of the concept (POC). Cve-2025-4664-second vulnerability Cve-2025-2783 To get under “active exploitation” in the wild.

To maintain potential threats, it is recommended to upgrade your Chrome browser to versions 136.7103.113/114 for Windows and Mac, and 136.0.7103.113 for Linux. Microsoft Edge, Brave, Opera and Vivaldi users are also recommended to apply fixes when they become available.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025

Russia related to APT28, exploited by Mdaemon Zero-Day to crack up web-shaped servers

May 15, 2025

Testing the handle only to meet the requirements? Time to change your approach

May 15, 2025

5 BCDR Essentials for Effective Rushing

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025

Russia related to APT28, exploited by Mdaemon Zero-Day to crack up web-shaped servers

May 15, 2025

Testing the handle only to meet the requirements? Time to change your approach

May 15, 2025

5 BCDR Essentials for Effective Rushing

May 15, 2025

New Chrome vulnerability allows for a cross -out data leak through a forklift policy

May 15, 2025

Bion and Ransomexx Exploit SAP Netweaver Nafice for deploying Pipemagic Trojan

May 14, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.