![]() ![]() In the past, there were many vulnerabilities reported in Java and it has become a target for client-side attacks. However, some implementation of JVM has vulnerabilities that allow the applet to bypass this restriction. JVM restricts the execution of the applet in a safe environment. JVM (Java Virtual Machine) is used to run the Java application. The Java applet can be used to provide interactive and rich features to the application that cannot be provided by HTML alone. Java is a programming language that can be used to develop various active content for websites. It can be used as malware once downloaded into your system. Anyone can write a plugin and host it on legitimate extension galleries. ![]() ![]() In many cases, plugins are executed without the user’s knowledge and hence pose a great threat to the browser and the system. A plugin that is not up to date can have serious vulnerabilities like buffer overflow, remote code execution, etc. Owing to wide usage, plugins are the prime target of attackers. Plugins are widely used and enable optimal functionality. For example, Adobe Flash Player is a plugin used for online videos or games. The plugin is the additional piece of software that is plugged into the browser to provide additional functionality. This poses a huge risk because there are multiple vulnerabilities related to these elements present on the Internet. These features are usually enabled by default in the browser. The browser uses various elements (such as JavaScript, Active X, Flash, etc.) to generate the web page. In this article, we will look at some features of the Chrome browser and associated risks with those features. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2022
Categories |