Multiple vulnerabilities have been discovered in Google Chrome that could result in an attacker gaining control of your computer.
These vulnerabilities can be exploited if a user visits, or is redirected to, a specially crafted web page. Successful exploitation of these vulnerabilities could result in an attacker gaining the same privileges as the affected application. The attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
- Update all out of Date Google Chrome products.
- Use a non-administrative profile for running programs.
- Don’t visit untrusted websites
- Don’t open email attachments or click on unknown URLs in your email.
More information can be found at the links below: