{"id":201,"date":"2024-05-27T09:57:42","date_gmt":"2024-05-26T20:57:42","guid":{"rendered":"https:\/\/securesphere.co.nz\/?p=201"},"modified":"2024-05-27T09:57:44","modified_gmt":"2024-05-26T20:57:44","slug":"google-fixes-8th-actively-exploited-chrome-zero-day-this-year-the-3rd-this-month","status":"publish","type":"post","link":"https:\/\/securesphere.co.nz\/index.php\/2024\/05\/27\/google-fixes-8th-actively-exploited-chrome-zero-day-this-year-the-3rd-this-month\/","title":{"rendered":"Google fixes 8th Actively Exploited Chrome Zero-Day this year. The 3rd this month."},"content":{"rendered":"\n<p>In the last few days, Google has released a new emergency security update to patch another actively exploited zero-day bug in its Chrome Web Browser. This bug can be tracked under: CVE-2024-5274.<br><br>This release makes the 3rd emergency zero-day release this month.<br><br>These releases (for May 2024) are:<br>CVE-2024-4671: a use-after-free issue that resides in the Visuals component (May 2024).<br>CVE-2024-4761: an out-of-bounds write issue that resides in the V8 JavaScript engine (May 2024).<br>CVE-2024-4947:\u00a0a type confusion that resides in V8 JavaScript engine (May 2024).<br><br>Google Chrome for home users should be set to a default of auto-download and install updates, so home users should have these updates installed promptly with no user-needed interaction.<br><br>However, for Corporate \/ Enterprise and\/or small businesses supported by a MSP, these updates may not be rolled out quickly.<br><br>SecureSphere strongly recommends that these updates are rolled out to Corporate \/ Enterprise environment and\/or small businesses environments ASAP.<br><br>Latest Chrome version as at May 27th, 2024 is: 125.0.6422.113 (Official Build &#8211; 64-bit).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the last few days, Google has released a new emergency security update to patch another actively exploited zero-day bug in its Chrome Web Browser.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[40,31],"tags":[26,41,32],"class_list":["post-201","post","type-post","status-publish","format-standard","hentry","category-cyber-vulnerability","category-google-chrome","tag-cybervulnerabilityawareness","tag-google","tag-googlechrome"],"_links":{"self":[{"href":"https:\/\/securesphere.co.nz\/index.php\/wp-json\/wp\/v2\/posts\/201","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securesphere.co.nz\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securesphere.co.nz\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securesphere.co.nz\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/securesphere.co.nz\/index.php\/wp-json\/wp\/v2\/comments?post=201"}],"version-history":[{"count":1,"href":"https:\/\/securesphere.co.nz\/index.php\/wp-json\/wp\/v2\/posts\/201\/revisions"}],"predecessor-version":[{"id":202,"href":"https:\/\/securesphere.co.nz\/index.php\/wp-json\/wp\/v2\/posts\/201\/revisions\/202"}],"wp:attachment":[{"href":"https:\/\/securesphere.co.nz\/index.php\/wp-json\/wp\/v2\/media?parent=201"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securesphere.co.nz\/index.php\/wp-json\/wp\/v2\/categories?post=201"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securesphere.co.nz\/index.php\/wp-json\/wp\/v2\/tags?post=201"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}