説明
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Inappropriate implementation vulnerability in Custom Tabs can be exploited to cause denial of service.
- Inappropriate implementation vulnerability in Extensions can be exploited to cause denial of service.
- Inappropriate implementation vulnerability in Intents can be exploited to cause denial of service.
- Inappropriate implementation vulnerability in Downloads can be exploited to cause denial of service.
- Inappropriate implementation vulnerability in Navigations can be exploited to cause denial of service.
- Use after free vulnerability in Navigations can be exploited to cause denial of service or execute arbitrary code.
- Inappropriate implementation vulnerability in Autofill can be exploited to cause denial of service.
- Insufficient validation of untrusted input vulnerability in Extensions can be exploited to bypass security restrictions.
オリジナルアドバイザリー
関連製品
CVEリスト
- CVE-2025-3067 critical
- CVE-2025-3069 critical
- CVE-2025-3068 critical
- CVE-2025-3074 high
- CVE-2025-3071 high
- CVE-2025-3066 critical
- CVE-2025-3073 high
- CVE-2025-3072 high
- CVE-2025-3070 high
も参照してください
お住まいの地域に広がる脆弱性の統計をご覧ください statistics.securelist.com
この脆弱性についての記述に不正確な点がありますか? お知らせください!