Description
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Implementation vulnerability can be exploited to cause denial of service.
- Use after free vulnerability in Extensions can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Gemini Live can be exploited to cause denial of service.
- Use after free vulnerability in Cast can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Picture can be exploited to cause denial of service.
- Validation of untrusted input vulnerability in DOM can be exploited to bypass security restrictions.
- Implementation vulnerability in Filesystems can be exploited to cause denial of service.
Original advisories
Related products
CVE list
- CVE-2025-8578 critical
- CVE-2025-8576 critical
- CVE-2025-8582 warning
- CVE-2025-8579 warning
- CVE-2025-8581 warning
- CVE-2025-8580 warning
- CVE-2025-8583 warning
- CVE-2025-8577 warning
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!