Kaspersky ID:
KLA81174
Date de la détection:
03/04/2025
Mis à jour:
03/11/2025

Description

Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. Out of bounds memory read vulnerability in Media can be exploited to cause denial of service.
  2. Out of bounds memory read vulnerability in V8 can be exploited to cause denial of service.
  3. Use after free vulnerability in Profiles can be exploited to cause denial of service or execute arbitrary code.
  4. Implementation vulnerability in Browser can be exploited to cause denial of service.
  5. Out of bounds memory read vulnerability in PDFium can be exploited to cause denial of service.
  6. Security vulnerability in DevTools can be exploited to bypass security restrictions.
  7. Inappropriate implementation vulnerability in Media Stream can be exploited to cause denial of service.
  8. Inappropriate implementation vulnerability in Selection can be exploited to cause denial of service.
  9. Inappropriate implementation vulnerability in Permission Prompts can be exploited to cause denial of service.

Fiches de renseignement originales

Produits associés

Liste CVE

  • CVE-2025-1919
    critical
  • CVE-2025-1914
    critical
  • CVE-2025-1916
    critical
  • CVE-2025-1917
    warning
  • CVE-2025-1918
    critical
  • CVE-2025-1915
    critical
  • CVE-2025-1921
    high
  • CVE-2025-1922
    warning
  • CVE-2025-1923
    warning

En savoir plus

Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com

Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !
Kaspersky IT Security Calculator:
Calculez le profil de sécurité de votre entreprise
Apprendre encore plus
Kaspersky!
Votre vie en ligne mérite une protection complète!
Apprendre encore plus
Do you want to save your changes?
Your message has been sent successfully.