Description
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information.
Below is a complete list of vulnerabilities:
- Integer overflow vulnerability in V8 can be exploited remotely to execute arbitrary code
- Side-channel information leakage vulnerability in V8 can be exploited to obtain sensitive information
Original advisories
Related products
CVE list
- CVE-2025-10891 critical
- CVE-2025-10890 critical
- CVE-2025-10892 critical
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!