Google Chrome53 official version update which features

Source: Internet
Author: User
Tags anonymous cve

Google Chrome53 official version of the update function list

Google browser Chrome stable stable version Usher V53 official version of the first release, Detailed version number v53.0.2785.89, the last official release on Thursday, August 4, after 28 days after Google released a new version of Chrome, this practice has updated 33 important security fixes and stability improvements.

Chrome53.0.2785.89 Update content:

Stable version has been updated to 53.0.2785.89

Security fixes and rewards

This update includes 33 security fixes

[$7500] [628942] High cve-2016-5147:universal XSS Blink. Credit to Anonymous

[$7500] [621362] High cve-2016-5148:universal XSS Blink. Credit to Anonymous

[$7500] [573131] High cve-2016-5149:script injection in extensions. Credit to Max Justicz (http://web.mit.edu/maxj/www/)

[$5000] [637963] High cve-2016-5150:use after free in Blink. Credit to Anonymous

[$5000] [634716] High cve-2016-5151:use after free in Pdfium. Credit to Anonymous

[$5000] [629919] High cve-2016-5152:heap overflow in pdfium. Credit to Giwan go of Stealien

[$3500] [631052] High cve-2016-5153:use after destruction in Blink. Credit to Atte Kettunen of OUSPG

[$3000] [633002] High cve-2016-5154:heap overflow in pdfium. Credit to Anonymous

[$3000] [630662] High cve-2016-5155:address bar spoofing. Credit to Anonymous

[$3000] [625404] High cve-2016-5156:use after free in event bindings. Credit to Jinmo123

[$TBD] [632622] High cve-2016-5157:heap overflow in pdfium. Credit to Anonymous

[$TBD] [628890] High cve-2016-5158:heap overflow in pdfium. Credit to Giwan go of Stealien

[$TBD] [628304] High cve-2016-5159:heap overflow in pdfium. Credit to Giwan go of Stealien

[$n/A] [622420] Medium cve-2016-5161:type confusion in Blink. Credit to 62600bca031b9eb5cb4a74adddd6771e working with Trend Micro ' s Zero Day Initiative

[$n/A] [589237] Medium cve-2016-5162:extensions Web accessible resources bypass. Credit to Nicolas Golubovic

[$3000] [609680] Medium cve-2016-5163:address bar spoofing. Credit to Rafay Baloch PTCL Etisalat (http://rafayhackingarticles.net)

[$2000] [637594] Medium cve-2016-5164:universal XSS using Devtools. Credit to Anonymous

[$1000] [618037] Medium cve-2016-5165:script injection in Devtools. Credit to Gregory Panakkal

[$TBD] [616429] Medium cve-2016-5166:smb Relay Attack via Save Page as. Credit to Gregory Panakkal

[$] [576867] Low cve-2016-5160:extensions the web accessible resources bypass. Credit to @l33terally, fogmarks.com (@FogMarks)

[642598] cve-2016-5167:various fixes from internal audits, fuzzing and other initiatives.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.