Description
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, spoof user interface.
Below is a complete list of vulnerabilities:
- Implementation vulnerability in Google Updater can be exploited to cause denial of service.
- Type confusion vulnerability in V8 can be exploited to cause denial of service.
- Implementation vulnerability in Passwords can be exploited to cause denial of service.
- Implementation vulnerability in Downloads can be exploited to cause denial of service.
- Use after free vulnerability in Media Stream can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Digital Credentials can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in WebRTC can be exploited to cause denial of service.
- Implementation vulnerability in DevTools can be exploited to cause denial of service.
- Heap buffer overflow vulnerability can be exploited to cause denial of service.
- Implementation vulnerability in Split can be exploited to cause denial of service.
Original advisories
Exploitation
Public exploits exist for this vulnerability.
Related products
CVE list
- CVE-2025-13630 critical
- CVE-2025-13631 critical
- CVE-2025-13632 high
- CVE-2025-13633 critical
- CVE-2025-13634 warning
- CVE-2025-13635 warning
- CVE-2025-13636 warning
- CVE-2025-13637 warning
- CVE-2025-13638 critical
- CVE-2025-13639 unknown
- CVE-2025-13640 warning
- CVE-2025-13720 critical
- CVE-2025-13721 critical
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!