A PHP Error was encountered

Severity: 8192

Message: Return type of LayerShifter\TLDExtract\Result::offsetExists($offset) should either be compatible with ArrayAccess::offsetExists(mixed $offset): bool, or the #[\ReturnTypeWillChange] attribute should be used to temporarily suppress the notice

Filename: src/Result.php

Line Number: 189

Backtrace:

File: /home/u149759368/domains/techthop.com/public_html/application/third_party/domain-parser/layershifter/tld-extract/src/Result.php
Line: 27
Function: _error_handler

File: /home/u149759368/domains/techthop.com/public_html/application/third_party/domain-parser/composer/ClassLoader.php
Line: 444
Function: include

File: /home/u149759368/domains/techthop.com/public_html/application/third_party/domain-parser/composer/ClassLoader.php
Line: 322
Function: Composer\Autoload\includeFile

File: /home/u149759368/domains/techthop.com/public_html/application/third_party/domain-parser/layershifter/tld-extract/src/Extract.php
Line: 167
Function: loadClass

File: /home/u149759368/domains/techthop.com/public_html/application/third_party/domain-parser/layershifter/tld-extract/src/static.php
Line: 35
Function: parse

File: /home/u149759368/domains/techthop.com/public_html/index.php
Line: 331
Function: require_once

The active zero-day exploit in Chrome needs to be patched now - TechThop

The active zero-day exploit in Chrome needs to be patched now

  • Facebook
  • Twitter

The active zero-day exploit in Chrome needs to be patched now

It was announced on Wednesday that Google is fixing an exploit that exists in the wild in its Chrome browser's Stable channel.Intents are not adequately validated against untrusted input, according to Google's advisory. Intents are usually used to pass data between Chrome and another application.

In Chrome's address bar, there is a share button. The Dark Reading blog noted that input validation is a common coding weakness.At the moment, we only have the information Ashley Shen and Christian Resell from the Google Threat Analysis Group have reported about the exploit.

t is currently restricted to those working on related components and registered with Chromium who have access to details of the exploit. It is possible to reveal those details once a certain percentage of users have applied the relevant updates.

The update will be rolled out over the next few days/weeks for Mac and Linux, and for Windows, it will be available for manual download right now.The update also contains 10 security fixes. This is Chrome's fifth zero-day vulnerability in 2022, according to Dark Reading.

More Tech