説明
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface, bypass security restrictions, cause denial of service.
Below is a complete list of vulnerabilities:
- Use after free vulnerability in V8 can be exploited remotely to execute arbitrary code
- Inappropriate implementation vulnerability in Toolbar can be exploited to spoof user interface.
- Inappropriate implementation vulnerability in Extensions can be exploited to bypass security restrictions.
- Inappropriate implementation vulnerability in Downloads can be exploited to spoof user interface.
- Insufficient validation of untrusted input vulnerability in Devtools can be exploited to bypass security restrictions.
- Inappropriate implementation vulnerability in Permissions can be exploited to cause denial of service.
- Inappropriate implementation vulnerability in Passkeys can be exploited to cause denial of service.
- Inappropriate implementation vulnerability in Compositing can be exploited to cause denial of service.
- Inappropriate implementation vulnerability in Downloads can be exploited to cause denial of service.
- Insufficient validation of untrusted input vulnerability in Downloads can be exploited to bypass security restrictions.
- Insufficient policy enforcement vulnerability in Devtools can be exploited to bypass security restrictions
オリジナルアドバイザリー
エクスプロイテーション
Public exploits exist for this vulnerability.
関連製品
CVEリスト
- CVE-2025-9864 unknown
- CVE-2025-9865 high
- CVE-2025-9866 critical
- CVE-2025-9867 high
- CVE-2025-12905 high
- CVE-2025-12906 high
- CVE-2025-12907 critical
- CVE-2025-12908 high
- CVE-2025-12909 high
- CVE-2025-12910 high
- CVE-2025-12911 warning
- CVE-2025-13107 warning
も参照してください
お住まいの地域に広がる脆弱性の統計をご覧ください statistics.securelist.com
この脆弱性についての記述に不正確な点がありますか? お知らせください!