![]() ![]() ![]() What we do know is that the vulnerability was assigned a high priority level, which means that it could potentially be dangerous if abused. Google doesn’t say much beyond that, and that makes sense - the vulnerability is still out in the wild, so it’s better to not make the exact details public just yet. It was caused by sub-par data validation in Mojo, which is a collection of runtime libraries. The vulnerability, now referred to as CVE-2022-3075, was discovered by an anonymous security researcher and reported straight to Google. The latest update is now available for Windows, Mac, and Linux - here’s how to make sure your browser is safe. The patch was deployed to fix a major zero-day security flaw that could potentially pose a risk to your device. Google has just released a new version of Chrome, and it’s crucial that you get your browser updated as soon as possible.
0 Comments
Leave a Reply. |