Most Securing Browser of 2015 With their Vulnerabilities

History of Web Browsers:-


Image source:-

All we know that Internet would cannot exist without any web browsers. Hence, the first very browser was invented in 1990 by Tim Berners-Lee. As we know that Sir Berners Lee, is known as world best Computer scientist that invented WWW. Before this creation, he made a proposal for Information Management System. Its done when he administered the first successful connection between HTTP client and a server. Hence, its called WorldWideWeb, but it get changed with Nexus in 1994. But its pointed by Digital Archeology is that when its first website is open, this page get displayed separately from browsers. Accordingly, when a first web page get created, a new browser has to be created as well. Most important point about Nexus is that its browser editor.

Evolution Of Web Browsers:-

The evolution Of Web Browsing is really complicated and full of ups and downs. Web browsing is most important as both of them come together. During few years, most of the browsers have popular battles. These battles are nothing but periodic ans are basically cause of new software products, different mobile trends and great changing market shares. But in the beginning of 2015, there is noticeable emerging of niche browsers as Vivaldi.

But here the question comes, which is the best browser security wise in 2015?

Browser status – 2015:-

According to 2015, in terms of security, most of the browsers have different vulnerabilities according to their impact.

Image source:-

Critical Vulnerability:-

This type of vulnerability is used to run malicious code and install software, and it involves no user interaction beyond the normal browsing.

High Vulnerability:-

It is used to gain your sensitive data from websites in other Windows and inject suspicious codes in the same websites. It involves nothing else rather your normal browsing activities.

Moderate vulnerability:-

This type of vulnerability could be high or critical, except it works in uncommon non-default configurations. Moreover, it requires the user to perform actions that appear unlikely.

Low or Minor Vulnerability:-

It can be possible by Denial of service attacks, minor data leaks or spoofs, or much more.

Vulnerabilities In Mozilla Firefox:-

Since its first release, there are 1228 vulnerabilities that have been found in Firefox . Most of the vulnerabilities have enclosed and fixed but some of them remain intact due to code inspection, and create problem.

According to Aug 2015, 3 vulnerabilities have been discovered during code inspection as reported by Security Researcher Ronald Crane. These vulnerabilities are as follows:-

  • Use of unowned memory.
  • Use of deleted object.
  • One particular memory safety bug.

Vulnerabilities in Google Chrome:-

According to CVE Details, total 1228 vulnerabilities were found in Google Chrome. In the month of June 2105, multiple bugs have been found in Google Chrome, that lead to remote code execution. It can be exploited in the terms of browser when a user is redirected to attacker page. This risk of enclosed vulnerabilities is known to be High for governments, businesses and common users.

List of Bugs that affect Google Chrome are as follows:-

  • Head-buffer-overflow in pdfium (CVE-2015-1271)
  • Settings that were allowed in executable files to run immediately after download (CVE-2015-1274)
  • UXXS in Chrome for Android (CVE-2015-1275)
  • Use After Free in IndexedDB (CVE-2015-1276)
  • Various bugs from Internal audits, fuzzing and other initiatives (CVE-2015-1289)

Vulnerabilities in Internet Explorer:-

Few time ago, Internet Explorer was the most popular browser. But many things get changed since then, and new vulnerabilities have been discovered. Hence, total 613 vulnerabilities have been identified in Internet Explorer. Have a look:-

(CVE-2015-2502), (CVE-2015-2452), (CVE-2015-2451), (CVE-2015-2450), (CVE-2015-2449), (CVE-2015-2448).

Vulnerabilities in Safari:-

According to CVE Details, there are total 598 vulnerabilities were found in Apple’s Safari in which 28 of them were get updated in august 2015. most of them are denial of service type, while the resr are “Info” and “Bypass + Info”.

This +info type of vulnerability would allow attackers to attack and track its user through crafted website.
A bypass+info type of vulnerability would bypass the Same Origin Policy and obtain sensitive data by leveraging a redirect.

Hence, in terms of security, the conclusion remains that there is no any such things as a safe browser. Actually, its all depends on company patch policy, at the time it needs to address and fix the security loopholes.

Browser Security 2015:-Conclusion


Hence, browsing is something that we all need to do. Most of us were educate in IT Security topics while others just forget that Internet or web is not safe as earlier it had been once. Hence, by identifying the vulnerabilities in browsers as Mozilla Firefox, Google Chrome, Internet Explorer as well as Safari minutely, we had come to the conclusion that Browser is safe as what we like the browser should be. Hence, whatever activities, we are carrying on browsers, we should keep in the mind that user are not anonymous and can be easily get tracked and identifies. Hence, you should be very careful regarding your browser and its browsing. In addition, to make your browser safe, you must scan your browser and keep your browser updated.