Description
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Inappropriate implementation vulnerability in Custom Tabs can be exploited to cause denial of service.
- Inappropriate implementation vulnerability in Extensions can be exploited to cause denial of service.
- Inappropriate implementation vulnerability in Intents can be exploited to cause denial of service.
- Inappropriate implementation vulnerability in Downloads can be exploited to cause denial of service.
- Inappropriate implementation vulnerability in Navigations can be exploited to cause denial of service.
- Use after free vulnerability in Navigations can be exploited to cause denial of service or execute arbitrary code.
- Inappropriate implementation vulnerability in Autofill can be exploited to cause denial of service.
- Insufficient validation of untrusted input vulnerability in Extensions can be exploited to bypass security restrictions.
Original advisories
Related products
CVE list
- CVE-2025-3067 critical
- CVE-2025-3069 critical
- CVE-2025-3068 critical
- CVE-2025-3074 high
- CVE-2025-3071 high
- CVE-2025-3066 critical
- CVE-2025-3073 high
- CVE-2025-3072 high
- CVE-2025-3070 high
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!