Google Chrome has been found to have a number of vulnerabilities, the most serious of which might result in arbitrary code execution. A web browser used to access the internet is called Google Chrome. In the context of the logged-on user, successful exploitation of the most serious of these flaws could result in arbitrary code execution.
An attacker might then install software, read, modify, or remove data, or create new accounts with full user access, depending on the privileges attached to the user. Less impacted users than those with administrative user privileges include those whose accounts are set up to have lower user rights on the system.