Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for remote code execution. Google Chrome is a web browser used to access the Internet. Successful exploitation of the most severe of these vulnerabilities could allow an attacker to execute arbitrary code in the context of the browser. Depending on the privileges associated with the application, an attacker could view, change, or delete data. If this application has been configured to have fewer user rights on the system, exploitation of the most severe of these vulnerabilities could have less impact than if it was configured with administrative rights.
More Stories
Next.js Middleware Auth.Bypass Vulnerability
What is the Vulnerability?FortiGuard Labs has identified ongoing attack attempts targeting a critical authorization bypass vulnerability (CVE-2025-29927) in the middleware...
httpd-2.4.64-1.fc42
FEDORA-2025-6d7a183951 Packages in this update: httpd-2.4.64-1.fc42 Update description: New httpd 2.4.64 release + security fixes Read More
httpd-2.4.64-1.fc41
FEDORA-2025-b486ffd351 Packages in this update: httpd-2.4.64-1.fc41 Update description: New httpd 2.4.64 release + security fixes Read More
USN-7608-6: Linux kernel (Xilinx ZynqMP) vulnerabilities
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This...
restic-0.18.0-1.fc43
FEDORA-2025-6241ca1662 Packages in this update: restic-0.18.0-1.fc43 Update description: Automatic update for restic-0.18.0-1.fc43. Changelog * Fri Jul 11 2025 Mikel Olasagasti...
SAP NetWeaver S/4HANA – ABAP Code Execution via Internal Function
Posted by Office nullFaktor GmbH on Jul 11 nullFaktor Security Advisory < 20250719 > =========================================================== Title: ABAP Code Execution via...