Multiple vulnerabilities were identified in Google Chrome, a remote attacker could exploit some of these vulnerabilities to trigger remote code execution, sensitive information disclosure, denial of service condition and security restriction bypass on the targeted system.





Source link

Write a comment:
*

Your email address will not be published.