Copyright © 2018 Authors. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. International Journal of Engineering & Technology, 7 (4.44) (2018) 242-246 International Journal of Engineering & Technology Website: www.sciencepubco.com/index.php/IJET Research paper Web Browser Vulnerabilities and Weakness Descriptive Analysis: Is it Chrome Keep Dominant? Abdullah Fajar 1* , Setiadi Yazid 2* 1,2 Faculty of Computer Science,Universitas Indonesia 1 Faculty Of Engineering, Universitas Widyatama *Corresponding author E-mail: setiadi@cs.ui.ac.id; Abstract Web Browser play the important mandatory role in accessing the application through the internet and may carry malicious content to the system hence threatening the system from the attacker. Google Chrome is one of popular browser since released on 2008 as one of prod- uct of Chromium Project at Google. Chrome is fourth ranking in Common Vulnerabilities Enumeration website and the first ranking among browser that have most of vulnerabilities reported. This paper describe a Descriptive analysis of weakness and vulnerabilities of Chrome browser. The analysis use comparison approach to other popular browser such as Safari and Firefox. The analysis also use main reference and database from mitre.org which have common weakness enumeration database and scoring system calculation for vulnera- bility. This work cover responsiveness rate among them regarding weakness and vulnerabilities update duration and severity rate. The validation has performed using Descriptive test regarding weakness and vulnerability behavior. According to Architectural, Development and Research Conceptual weakness reported, the browsers has not significantly indicate the difference except between Chrome and Fire- fox in research conceptual weakness. The severity of browser vulnerabilities shown by Firefox and the best responsiveness to update browser weakness shown by Chrome, followed by Safari. Using Descriptive analysis, Chrome will keep dominant against the other browser, while Firefox and Safari potentially become unpopular such as Internet Explorer for upcoming time. Keywords: Chrome; Vulnerability; Weakness; Attack; Security 1. Introduction The most interaction between internet and computer user through World Wide Web. Users can browse the content of internet with a diverse landscape of services and applications. Now, the services and application through the web must keep their user safe from various malicious content. The main target in this challenge most- ly occurred on web browsers. Insecure/malicious content sender (attacker) point at Web Browsers because there is a lot of com- promising to keep the risk content able to be delivered through it. Reis et.al [1] stated, there three factor must be considered by browsers vendor to keep safe, there are: (1) The Severity of Vul- nerability; (2) The windows of Vulnerability; (3) The Frequency of exposure. If these consideration are followed out by mitigation action then the security will improve, multiply benefit and assist user to keep users safe. Securing browser is the first step that need to be taken in order to assure secure online protection. The threats tend to increase by taking advantage of web browser vulnerability through vulnerable webs application. This condition become worse according to sev- eral factor such as: 1. Many computer users are not aware of the click on the web links. 2. Software and third party software packages installed combined increases the number of vulnerabilities 3. Many websites require that users enable features or in- stall more software, third- party software which doesn’t get security updates putting the computer at additional risk. 4. Many users do not know how to configure their web browsers securely If that website design allowing to host malicious code, then some vulnerabilities in a particular browser enabling this mali- cious code to run processes within the browser application in unin- tended ways. Web Browser vulnerability can be minimized by means of updating process regularly [2]. That prevention will not affective if the underlying system has already compromised. Some parts of browsers such as scripting, add-ons, and cookies are par- ticularly vulnerable and need to be considered for taking action further. Google Chrome as one of popular web browser is released at late 2008. This browser is intended to be fast and secure one. Chrome treat each web page as individual process and make it as a sand- boxing to confirm the safety. Chrome uses a model to allocate a process for sandboxing tabs. Chrome retrieves updates regularly of two issues (phishing and malware), and also Google warns users if they attempt to visit a potentially harmful which has al- ready warning flag. This service is also made available for use by others via a free public API called "Google Safe Browsing API". This paper describe an analysis of weakness and vulnerabilities enumeration for Chrome Browser as case study. This work use Descriptive data analysis approach from CVE database (cve- details.com) to describe vulnerability and weakness occurrences behavior. This work choose Chrome as target to be analyzed and will compare the characteristics to other browser such as Safari,