The Atlas VPN survey results are based on data from the VulDB vulnerability database. The report summarizes security flaws discovered in the database between January 1, 2022, and October 5, 2022.

Google Chrome, the world’s most used web browser, was named the most vulnerable web browser in a survey issued on Wednesday by Atlas VPN. The VPN service provider, which is part of Nord security, estimates that 303 vulnerabilities were reported this year, with a total of 3,159 cumulative vulnerabilities detected in the popular web browser to date.

Atlas-VPN-Survey-Google-Chrome-is-worlds-most-vulnerable-web-browser

The statistics are based on data from the VulDB vulnerability database. The report summarizes security flaws discovered in the database between January 1, 2022, and October 5, 2022. The research, however, does not identify the severity of vulnerabilities; rather, it focuses on the total number of flaws (including those with patches).

Mozilla’s Firefox browser is ranked second with 117 vulnerabilities. Microsoft Edge had 103 vulnerabilities as of October 5, which is 61% more than the prior year. According to the research, it has had 806 vulnerabilities since its release.

When compared to other browsers, Apple’s Safari browser has fewer vulnerabilities than its competitors. According to the analysis, it has 26 vulnerabilities in the first three-quarters of 2022 and 1,139 total since its launch. With over 1 billion users recently, Safari is now the world’s second-most popular browser, trailing only Google Chrome.

Surprisingly, just 344 vulnerabilities have been disclosed for the Opera browser in 2022. According to the poll, Google Chrome, Microsoft Edge, and Opera are all based on the Chromium engine, implying that all of these browsers may be vulnerable to Chromium vulnerabilities.

The Indian Computer Emergency Response Team (CERT-IN) recently published a high-severity advisory regarding various vulnerabilities discovered in the Google Chrome desktop browser. The agency has issued a warning to users about remote hackers gaining access to the system and doing destructive operations.

Continue to read more latest news

 249 total views,  1 views today