Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » New Chrome vulnerability allows for a cross -out data leak through a forklift policy
Global Security

New Chrome vulnerability allows for a cross -out data leak through a forklift policy

AdminBy AdminMay 15, 2025No Comments2 Mins Read
New Chrome Vulnerability
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


May 15, 2025Red LakshmananBrowser’s safety / safety online

A new chrome vulnerability

Google on Wednesday liberated Updates to resolve four security issues in your Chrome web browser, including one for which it is said, exists in the wild.

Vulnerability at high speed, tracked as Cve-2025-4664 (CVSS assessment: 4.3), characterized as a case of insufficient policy implementation in a component called Loader.

“Insufficient implementation of a policy in Google Chrome forking up to 136.0.7103.113 allowed a remote attacker to leak data of crossed origin through the created HTML page,” A description deficiency.

The technical giant attributed to the VSEVolod Kokorin (@slonser_) security researcher with a detail of the lack of May 5, 2025, adding that there was a “feat for Cve-2025-464” in the wild.

Cybersecurity

“Unlike other browsers, Chrome decides the title of references to the resource,” Kokorin – Note In a series of posts on X previously this month. “The problem is that the link title can set the abstract.

The researcher continued to add that the request parameters may contain sensitive data that could lead to a complete absorption account and that the request parameter information could be stolen through a third party resource image.

It is unclear whether the vulnerability was used in the malicious context outside this demonstration of the concept (POC). Cve-2025-4664-second vulnerability Cve-2025-2783 To get under “active exploitation” in the wild.

To maintain potential threats, it is recommended to upgrade your Chrome browser to versions 136.7103.113/114 for Windows and Mac, and 136.0.7103.113 for Linux. Microsoft Edge, Brave, Opera and Vivaldi users are also recommended to apply fixes when they become available.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025

New Mattery Model for Browser Safety: Closing Risk in Last Mile

July 1, 2025

Google Patches Critical Lack of Zero Day in the V8 Chrome engine after active operation

July 1, 2025

US arrests in North Korean IT -Work scheme; Captures 29 domains and raids 21 laptops

July 1, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025

New Mattery Model for Browser Safety: Closing Risk in Last Mile

July 1, 2025

Google Patches Critical Lack of Zero Day in the V8 Chrome engine after active operation

July 1, 2025

US arrests in North Korean IT -Work scheme; Captures 29 domains and raids 21 laptops

July 1, 2025

Microsoft Removes Password Management from Authenticator app since August 2025

July 1, 2025

American agencies warn of Iranian protection cyber growth, OT networks and critical infrastructure

June 30, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.