Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Google Chrome is a web browser used to access the internet. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
More Stories
vaultwarden-1.32.7-1.fc41
FEDORA-2025-0abee701c3 Packages in this update: vaultwarden-1.32.7-1.fc41 Update description: update to 1.32.7 Read More
freeipa-4.12.2-3.fc40
FEDORA-2025-6baf694c75 Packages in this update: freeipa-4.12.2-3.fc40 Update description: CVE-2024-11029 Release note: https://www.freeipa.org/release-notes/4-12-3.html Read More
freeipa-4.12.2-7.fc41
FEDORA-2025-b21777d1b5 Packages in this update: freeipa-4.12.2-7.fc41 Update description: CVE-2024-11029 Release note: https://www.freeipa.org/release-notes/4-12-3.html Read More
ZDI-25-030: Microsoft Office Word DOCX File Parsing Uninitialized Pointer Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Office Word. User interaction is required...
ZDI-25-029: Microsoft Windows Installer Service Link Following Local Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the...
ZDI-25-028: Microsoft Office Word RTF File Parsing Memory Corruption Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Office Word. User interaction is required...