Close Menu
  • Home
  • Products
    • Bug Bounty Platform
    • Penetration Testing
    • External Attack Surface
    • Red Teaming
    • Dark Web Monitoring
  • Programs
  • Partner
  • Resources
    • Customer Docs
    • Researcher Docs
    • Apis
  • Researcher
    • Leaderboard
  • FAQ
  • Try BugBounty
  • Researcher Login
  • Customer Login
X (Twitter) LinkedIn
BugBustersLabs Blog
  • Home
  • Products
    • Bug Bounty Platform
    • Penetration Testing
    • External Attack Surface
    • Red Teaming
    • Dark Web Monitoring
  • Programs
  • Partner
  • Resources
    • Customer Docs
    • Researcher Docs
    • Apis
  • Researcher
    • Leaderboard
  • FAQ
  • Try BugBounty
  • Researcher Login
  • Customer Login
BugBustersLabs Blog
Home » CVE-2024-10487: Google Chrome Security Flaw Discovered
Proactive Cyber Defense

CVE-2024-10487: Google Chrome Security Flaw Discovered

Amalan MariajohnAmalan MariajohnJanuary 13, 20250
Share Copy Link WhatsApp Facebook Twitter LinkedIn Reddit Telegram Email
CVE-2024-10487 a critical vulnerability in Google Chrome
Share
Copy Link WhatsApp LinkedIn Facebook Twitter Email Reddit

Google Chrome has recently been found to have several security issues, with the most serious allowing attackers to run harmful code on your device. A critical vulnerability, CVE-2024-10487, discovered by Apple on Google Chrome, can even lead to a denial of service, disrupting your browsing experience. In this blog, we’ll explain what CVE-2024-10487 is and share tips on how to protect your system from these types of security risks.

What is CVE-2024-10487?

CVE-2024-10487 is a serious security issue found in Google Chrome version 130.0.6723.92 and earlier. The Out of Bounds Write vulnerability exists in Dawn, a core part of Chrome. It happens when a hacker creates a specific HTML page that causes the browser to access memory incorrectly. This could allow attackers to run harmful code or crash the system. The Chromium team has labeled this flaw as Critical because of its severity.

CVE-2024-10487

Google Fixes Critical Vulnerabilities in Chrome

Google has fixed the critical vulnerability CVE-2024-10487 in Chrome, reported by Apple Security Engineering and Architecture (SEAR) on October 23, 2024. Attackers have not confirmed using the Dawn component’s out-of-bounds write flaw in active attacks. Google also addressed CVE-2024-10488, a high-severity vulnerability in WebRTC. Chrome 130 addressed both issues, deploying updates for Windows, Mac, and Linux. Full details will remain confidential until most users have applied the update.

Primitive Measures to Stop Security Vulnerabilities in the Future

Check your Chrome privacy and security with a safety check and follow the safety measures to avoid vulnerabilities like CVE-2024-10487 and CVE-2024-10488 in the future

  • Find and Fix Password Problems: Chrome will notify you about any usernames or passwords it detects as leaked in a data breach.
  • Check Your Safe Browsing Settings: Chrome’s Safety Check regularly prompts you to review your Safe Browsing settings to help protect against malware, phishing attempts, and other online threats. Discover more about Chrome’s Safe Browsing features.
  • Update Chrome for Better Security: Chrome will let you know when there’s a new update so you can stay safe with the latest security fixes.
  • Manage Notifications Easily: Chrome will sometimes remind you to review which sites can send you notifications so you can block the ones you don’t want.
  • Remove Permissions You Don’t Use: If you haven’t visited a site for a while, Chrome will automatically remove its permissions to help protect your privacy.

To conclude, CVE-2024-10487 shows that even popular software can have security issues. Keeping your software updated and using good security habits can help reduce risks. Follow Chrome’s privacy and security tips to protect your data and stay safe from such problems.

Browser Security Chrome Vulnerability CVE-2024-10487 Google Chrome
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCVE-2024-38080: Serious Security Vulnerability in Microsoft Windows Hyper-V
Next Article How to Become a Bug Bounty Hunter
Amalan Mariajohn
  • Website
  • LinkedIn

Amalan Mariajohn, the Founder and CEO of Bugbusterslabs, brings over 27 years of experience in the cybersecurity industry, specializing in security testing, consulting, red team management, and vulnerability management for global enterprises. Holding a Master's in Business Administration (MBA - E-Business), Throughout his career, Amalan has worked with leading organizations like CA, McAfee, Verizon, Target, and Atlassian, focusing on application security, cloud security, and malware threat analysis. Driven by a passion for AI-driven cybersecurity solutions and innovation in vulnerability management, Amalan founded Bugbusterslabs to provide businesses with proactive, automated solutions for bug bounty programs, dark web monitoring, and attack surface management. His mission is to create platforms that foster collaboration between security researchers and organizations, enhancing the overall security posture in an ever-evolving digital landscape.

Related Posts

Dark Web Monitoring

Black Hat Hacker: Techniques, Threats, and Real-World Risks

April 21, 2025
Proactive Cyber Defense

DeepSeek Cyberattack: What Happened and What We Can Learn

April 9, 2025
AI in Cybersecurity

Cybersecurity vs Software Engineering: A Complete Comparison

April 2, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest

Black Hat Hacker: Techniques, Threats, and Real-World Risks

April 21, 2025

The Role of AI in Attack Surface Monitoring and Threat Defense

April 15, 2025

AI-Powered Dark Web Monitoring: The Future of Data Protection

April 11, 2025

DeepSeek Cyberattack: What Happened and What We Can Learn

April 9, 2025

11 Best Operating System Built for Ethical Hacking

April 5, 2025

Key Terms Every Cybersecurity Professional Should Know

April 4, 2025

Cybersecurity vs Software Engineering: A Complete Comparison

April 2, 2025

How to Become a Penetration Tester: A Beginner’s Guide

March 31, 2025
Products
  • Bug Bounty Platform
  • Penetration Testing
  • External Attack Surface
  • Red Teaming
  • Dark Web Monitoring

Mailing Address

Email:info@bugbusterslabs.com

Legal Name:

Bugbusterslabs Private Limited

Registered Office(India):

Bugbusterslabs Private Limited

1st Floor, 13, 3rd Cross Street, Kalaimagal Nagar, Ekkattuthangal, Chennai, Tamilnadu, India

Branch Office:

Bugbusterslabs Private Limited

We Work Princeville, Domlur, Princeville, Embassy Golf Links Business Park, off Intermediate ring road, Domlur, Bangalore – 560071, Karnataka, India.

Registered Office (USA):

Bugbusterslabs Inc. 1111B S Governors Ave STE 20032 Dover, DE 19904.

X (Twitter) LinkedIn
  • About Us
  • Privacy Policy
  • Terms & Conditions
  • Cancellation and Refund Policy
  • Security Policy
  • Contact Us
© 2025 Bugbusterslabs. All rights reserved.

Type above and press Enter to search. Press Esc to cancel.