Google urgently fixed 16th zero-day vulnerability in Chrome

Google urgently fixed 16th zero-day vulnerability in Chrome

Google urgently released a new version of the Chrome browser 96.0.4664.110 for Windows, macOS and Linux, fixing a dangerous zero-day vulnerability (CVE-2021-4102). The vulnerability is actively exploited by hackers in real attacks.

Tech giant noted that the update may take some time until it reaches all users. However, the patch is already being distributed worldwide in the Stable channel for the desktop version.

The use after free vulnerability (CVE-2021-4102) was discovered by an anonymous cybersecurity researcher and is contained in the Chrome V8 JavaScript engine. Attackers usually exploit this type of vulnerbilities to execute arbitrary code on computer systems or to escape the browser's security sandbox.

Google found evidence of attacks exploiting this vulnerability in the wild, but did not provide additional information on the incidents.

This is the sixteenth zero-day vulnerability in Chome, found in 2021. The rest of the vulnerabilities were fixed in the following order:

Back to the list

Latest Posts

Hazy Hawk hijacks abandoned cloud resources of global orgs to spread scams and malware

Hazy Hawk hijacks abandoned cloud resources of global orgs to spread scams and malware

Hazy Hawk leverages “dangling” DNS CNAME records, allowing attackers to register the abandoned services and takeover subdomains associated with trusted brands.
21 May 2025
100+ websites lured victims into downloading malicious Chrome extensions

100+ websites lured victims into downloading malicious Chrome extensions

Once users were convinced to install the extensions, the malicious code harvested browser session cookies.
21 May 2025
EU sanctions Russian disinformation clusters operating across Africa and Europe

EU sanctions Russian disinformation clusters operating across Africa and Europe

The EU sanctioned Stark Industries, a Moldova-based bulletproof hosting company that has hosted a wide array of malicious activity, ranging from malware servers to websites linked to Doppelgang.
21 May 2025