{"id":141722,"date":"2022-07-05T23:22:59","date_gmt":"2022-07-06T04:22:59","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2022\/07\/zero-day-vulnerability-in-chrome-edge-brave-opera-vivaldi-browsers-allow-taking-control-of-your-laptop-or-mobile"},"modified":"2022-07-05T23:22:59","modified_gmt":"2022-07-06T04:22:59","slug":"zero-day-vulnerability-in-chrome-edge-brave-opera-vivaldi-browsers-allow-taking-control-of-your-laptop-or-mobile","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2022\/07\/zero-day-vulnerability-in-chrome-edge-brave-opera-vivaldi-browsers-allow-taking-control-of-your-laptop-or-mobile","title":{"rendered":"Zero-Day vulnerability in Chrome, Edge, Brave, Opera, Vivaldi browsers allow taking control of your laptop or mobile"},"content":{"rendered":"<p><\/p>\n<p><iframe style=\"display: block; margin: 0 auto; width: 100%; aspect-ratio: 4\/3; object-fit: contain;\" src=\"https:\/\/www.youtube.com\/embed\/-plvKXjb_CY?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope;\n   picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<p>In many cases, security vulnerabilities appear that affect the programs that we use on a day-to-day basis. A clear example is the browser. It may have vulnerabilities and that can allow a hacker to break in and steal passwords or personal information. That is what is happening now with Google Chrome and you should update it as soon as possible to fix a zero-day bug.<\/p>\n<p>Google has released security updates to address a Zero-Day in its Chrome web browser that it said is being exploited in the wild.<\/p>\n<p>The vulnerability, identified as CVE-2022\u20132294, relates to a buffer overflow component <a href=\"https:\/\/en.wikipedia.org\/wiki\/WebRTC\" target=\"_blank\" rel=\"noreferrer noopener\">WebRTC<\/a> that provides real-time video and audio communication capabilities in browsers, without the need to install plugins or download native applications.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In many cases, security vulnerabilities appear that affect the programs that we use on a day-to-day basis. A clear example is the browser. It may have vulnerabilities and that can allow a hacker to break in and steal passwords or personal information. That is what is happening now with Google Chrome and you should update [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1523,1492],"tags":[],"class_list":["post-141722","post","type-post","status-publish","format-standard","hentry","category-computing","category-security"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/141722","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=141722"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/141722\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=141722"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=141722"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=141722"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}