Multiple Vulnerabilities in Google Chrome

Multiple vulnerabilities have been discovered in Google Chrome that could result in an attacker gaining control of your computer.

These vulnerabilities can be exploited if a user visits, or is redirected to, a specially crafted web page. Successful exploitation of these vulnerabilities could result in an attacker gaining the same privileges as the affected application. The attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

Our recommendations:

  • Update all out of Date Google Chrome products.
  • Use a non-administrative profile for running programs.
  • Don’t visit untrusted websites
  • Don’t open email attachments or click on unknown URLs in your email.

More information can be found at the links below: