Google's Chrome browser is two years old today and the company celebrated the milestone with a new version chock-filled with feature enhancements and security fixes.
The Google Chrome 6.0, available in stable and beta channels for Windows, Mac, and Linux, patches a total of 15 documented security vunerabilities.
As part of its policy of paying researchers for details on serious security problems, Google shelled out more than $4,300 in bounties.
Here's the skinny on the latest batch of Google Chrome patches
-  Low Pop-up blocker bypass with blank frame target. Credit to Google Chrome Security Team (Inferno) and “ironfist99”.
-  Medium URL bar visual spoofing with homographic sequences. Credit to Chris Weber of Casaba Security.
-  Medium Apply more restrictions on setting clipboard content. Credit to Brook Novak.
-  High Stale pointer with SVG filters. Credit to Tavis Ormandy of the Google Security Team.
-  Medium Possible installed extension enumeration. Credit to Lostmon.
-   Low Browser NULL crash with WebSockets. Credit to Google Chrome Security Team (SkyLined), Google Chrome Security Team (Justin Schuh) and Keith Campbell.
- [$1000]  High Use-after-free in Notifications presenter. Credit to Sergey Glazunov.
-  High Notification permissions memory corruption. Credit to Michal Zalewski of the Google Security Team and Google Chrome Security Team (SkyLined).
- [$1337]   High Integer errors in WebSockets. Credit to Keith Campbell and Google Chrome Security Team (Cris Neckar).
- [$500]  High Memory corruption with counter nodes. Credit to kuzzcc.
-  Low Avoid storing excessive autocomplete entries. Credit to Google Chrome Security Team (Inferno).
-  High Stale pointer in focus handling. Credit to VUPEN Vulnerability Research Team (VUPEN-SR-2010-249).
- [$1000]  High Sandbox parameter deserialization error. Credit to Ashutosh Mehra and Vineet Batra of the Adobe Reader Sandbox Team.
- [$500]  Medium Cross-origin image theft. Credit to Isaac Dawson.