Описание
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Use after free vulnerability in V8 can be exploited remotely to execute arbitrary code
- Inappropriate implementation vulnerability in Downloads can be exploited to spoof user interface.
- Inappropriate implementation vulnerability in Toolbar can be exploited to spoof user interface.
- Inappropriate implementation vulnerability in Extensions can be exploited to bypass security restrictions.
Первичный источник обнаружения
Связанные продукты
Список CVE
- CVE-2025-9864 critical
- CVE-2025-9865 high
- CVE-2025-9866 critical
- CVE-2025-9867 high
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!