Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Google Chrome is a web browser used to access the Internet. Successful exploitation of the most severe of these vulnerabilities could allow an attacker to execute arbitrary code in the context of the browser. Depending on the privileges associated with the application, an attacker could view, change, or delete data. If this application has been configured to have fewer user rights on the system, exploitation of the most severe of these vulnerabilities could have less impact than if it was configured with administrative rights.
More Stories
libxml2-2.12.10-1.fc40
FEDORA-2025-adbb0031f7 Packages in this update: libxml2-2.12.10-1.fc40 Update description: Update to 2.12.10 Read More
libxml2-2.12.10-1.fc41
FEDORA-2025-65790c11eb Packages in this update: libxml2-2.12.10-1.fc41 Update description: Update to 2.12.10 Fix CVE-2024-56171 and CVE-2025-24928. Read More
libxml2-2.12.10-1.fc42
FEDORA-2025-b9170cd464 Packages in this update: libxml2-2.12.10-1.fc42 Update description: Update to 2.12.10 Fix CVE-2024-56171 and CVE-2025-24928. Read More
kitty-0.40.0-2.fc40
FEDORA-2025-2fe21e3da5 Packages in this update: kitty-0.40.0-2.fc40 Update description: Update to 0.40.0 https://sw.kovidgoyal.net/kitty/changelog/#detailed-list-of-changes Read More
USN-7351-1: RESTEasy vulnerabilities
Nikos Papadopoulos discovered that RESTEasy improperly handled URL encoding when certain errors occur. An attacker could possibly use this issue...
USN-7344-2: Linux kernel vulnerabilities
Chenyuan Yang discovered that the CEC driver driver in the Linux kernel contained a use-after-free vulnerability. A local attacker could...