Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Google Chrome is a web browser used to access the Internet. Successful exploitation of the most severe of these vulnerabilities could allow an attacker to execute arbitrary code in the context of the browser. Depending on the privileges associated with the application, an attacker could view, change, or delete data. If this application has been configured to have fewer user rights on the system, exploitation of the most severe of these vulnerabilities could have less impact than if it was configured with administrative rights.
More Stories
llama-cpp-b4094-11.fc42
FEDORA-2025-b356588c06 Packages in this update: llama-cpp-b4094-11.fc42 Update description: Fix bz2358011 Read More
ZDI-CAN-26839: LiteLLM
A CVSS score 5.7 AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N severity vulnerability discovered by 'Alfredo Oliveira and David Fiser of Trend Research' was reported to...
USN-7430-1: Dino vulnerability
Kim Alvefur discovered that Dino did not correctly sanitize certain messages. A remote attacker could possibly use this issue to...
USN-7346-3: OpenSC vulnerabilities
USN-7346-1 fixed vulnerabilities in OpenSC. The update introduced a regression which broke smartcard based authentication. This update fixes the problem....
USN-7426-2: poppler vulnerabilities
USN-7426-1 fixed several vulnerabilities in poppler. This update provides the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS....
fish-3.7.1-2.el9
FEDORA-EPEL-2025-cd25b2c8a7 Packages in this update: fish-3.7.1-2.el9 Update description: Fixes a security issue that requires updating to fish >= 3.6.2 See...