Nowadays, browsers are the most commonly used software for people to access the Internet and have become the target of hackers. Using security vulnerabilities in browsers to attack is a common way for hackers to launch malicious attack activities. According to the latest research report released by foreign institutions, Chrome browser, with 3.3 billion users, has become the world's most popular browser overlord with a market share of up to 60%. However, so far, the number of vulnerabilities found on Chrome browsers is also the largest.
From January to October 5 this year, based on data statistics on the VulDB vulnerability database, it shows that the total number of vulnerabilities in Chrome browser reached 303, ranking first in the number of browser vulnerabilities. The second is Firefox browser Mozilla Firefox, with 117 vulnerabilities. The third place is Microsoft Edge browser , with 103 vulnerabilities. The fourth and fifth places are Apple Safari with 26 vulnerabilities and Opera with zero vulnerabilities.
From January to October 5 this year, the number of browsers found vulnerabilities, and Google Chrome ranked first. If
is further extended, since its debut in September 2008, the total number of vulnerabilities found in Google Chrome has reached 3,159; the total number of vulnerabilities of Mozilla Firefox has been 2,361 security vulnerabilities since 2004 and the total number of security vulnerabilities of Apple Safari has been 2003 and the total number of security vulnerabilities of Apple Safari has been 1,139. Microsoft has launched Edge browser based on Chromium since 2020, with a total of 806 security vulnerabilities. As for the old Opera browser, it is the browser with the least number of vulnerabilities, with only 344 security vulnerabilities since 1995.
Over the years, the cumulative number of vulnerabilities found in browsers.
is a warning message for the browser to find security vulnerabilities from time to time. In order to avoid hackers taking the opportunity to exploit the vulnerabilities to malicious attacks, network experts have proposed three suggestions for use to browser users. The first is to ensure that the browser version is used and the latest updated version is always available. Second, if you need to install browser extensions, be careful not to download from unknown sources. The third is to be alert and cautious when receiving emails from unknown senders, and do not easily click on the attachment URL or file to avoid falling into the trap of phishing emails.