cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2025-1006,https://securityvulnerability.io/vulnerability/CVE-2025-1006,Use After Free Vulnerability in Google Chrome Network Module,"A use after free vulnerability was identified in the network module of Google Chrome prior to version 133.0.6943.126. This flaw can allow a remote attacker to exploit heap memory corruption issues through specially crafted web applications, potentially compromising system integrity or leading to an unexpected application state.",Google,Chrome,8.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-19T16:55:31.747Z,0 CVE-2025-1426,https://securityvulnerability.io/vulnerability/CVE-2025-1426,Heap Buffer Overflow Vulnerability in Google Chrome for Android,"A heap buffer overflow vulnerability has been identified in Google Chrome for Android, potentially allowing remote attackers to exploit heap corruption through a specifically crafted HTML page. This flaw can lead to significant security risks, enabling unauthorized access and manipulation of data.",Google,Chrome,8.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-19T16:55:31.252Z,0 CVE-2025-0999,https://securityvulnerability.io/vulnerability/CVE-2025-0999,Heap Buffer Overflow in Google Chrome by Google,"A significant security flaw was identified in the V8 engine within Google Chrome, where a heap buffer overflow could occur. This vulnerability enables remote attackers to manipulate heap memory through specially crafted HTML pages, potentially leading to heap corruption. Users of Google Chrome versions prior to 133.0.6943.126 are at risk and should ensure their browsers are updated to mitigate threats.",Google,Chrome,8.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-19T16:55:30.675Z,575 CVE-2025-0998,https://securityvulnerability.io/vulnerability/CVE-2025-0998,Out of Bounds Memory Access in Google Chrome by Google,"A vulnerability exists in Google Chrome due to out of bounds memory access in the V8 JavaScript engine. This flaw enables remote attackers to execute arbitrary code within a sandboxed environment by tricking users into loading specially crafted HTML pages, potentially leading to significant security breaches. Users are encouraged to update their browsers to mitigate the risks associated with this vulnerability.",Google,Chrome,9.6,CRITICAL,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-15T01:17:26.235Z,0 CVE-2025-0997,https://securityvulnerability.io/vulnerability/CVE-2025-0997,Use After Free Vulnerability in Google Chrome Navigation,A use after free vulnerability has been identified in the Navigation component of Google Chrome versions prior to 133.0.6943.98. This flaw can be exploited by remote attackers to perform heap corruption through crafted Chrome Extensions. Users are urged to update their browsers to mitigate potential security threats associated with this vulnerability.,Google,Chrome,8.1,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-15T01:17:25.637Z,0 CVE-2025-0996,https://securityvulnerability.io/vulnerability/CVE-2025-0996,Browser UI Spoofing Vulnerability in Google Chrome for Android,"A vulnerability in the implementation of the Browser UI in Google Chrome for Android allows a malicious actor to spoof the Omnibox content through a specially crafted HTML page. This exploit could mislead users by displaying deceptive URLs, potentially facilitating phishing attacks. Users of Google Chrome on Android versions prior to 133.0.6943.98 are at risk and should consider updating to maintain security.",Google,Chrome,5.4,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-15T01:17:25.209Z,0 CVE-2025-0995,https://securityvulnerability.io/vulnerability/CVE-2025-0995,Use After Free Vulnerability in Google Chrome by Google,A use after free vulnerability in the V8 engine of Google Chrome allows remote attackers to exploit heap corruption by crafting malicious HTML pages. This flaw can lead to unauthorized actions within the browser and potentially compromise user security. Users of affected versions are advised to upgrade to the latest version to mitigate risks associated with this vulnerability.,Google,Chrome,8.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-15T01:17:24.705Z,216 CVE-2025-0451,https://securityvulnerability.io/vulnerability/CVE-2025-0451,UI Spoofing Vulnerability in Google Chrome Extensions,"A vulnerability exists in Google Chrome's Extensions API that allows remote attackers to manipulate UI elements through crafted Chrome Extensions. By convincing a user to execute specific UI gestures, the attacker can display misleading information, potentially causing users to divulge sensitive information or interact with unintended interfaces. This flaw highlights the importance of user vigilance and the need for timely updates to protect against such exploits.",Google,Chrome,6.3,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-04T18:53:06.962Z,0 CVE-2025-0445,https://securityvulnerability.io/vulnerability/CVE-2025-0445,Use After Free Vulnerability in Google Chrome,"A use after free vulnerability has been identified in the V8 engine of Google Chrome, which allows remote attackers to exploit heap corruption. This can be triggered by a specially crafted HTML page, potentially leading to unauthorized actions or data exposure. The issue affects Google Chrome versions before 133.0.6943.53, highlighting the importance of keeping your browser updated to enhance security and protect against potential threats.",Google,Chrome,5.4,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-04T18:53:06.689Z,174 CVE-2025-0444,https://securityvulnerability.io/vulnerability/CVE-2025-0444,Use After Free Vulnerability in Google Chrome,"A use after free vulnerability exists in the Skia graphics library within Google Chrome prior to version 133.0.6943.53. This flaw can potentially allow a remote attacker to exploit heap corruption through a specially crafted HTML page, leading to unauthorized actions or compromise of system integrity. Users are advised to update to the latest version to mitigate this risk.",Google,Chrome,6.3,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-04T18:53:06.437Z,126 CVE-2025-0762,https://securityvulnerability.io/vulnerability/CVE-2025-0762,Use After Free Vulnerability in Google Chrome DevTools,"A use after free vulnerability in the DevTools of Google Chrome allows remote attackers to exploit heap corruption through a specially crafted Chrome Extension. This issue affects versions prior to 132.0.6834.159, potentially allowing an attacker to manipulate memory and execute arbitrary code. Users are advised to upgrade to the latest version to mitigate this security risk.",Google,Chrome,8.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-29T10:33:45.673Z,0 CVE-2025-0612,https://securityvulnerability.io/vulnerability/CVE-2025-0612,Out of Bounds Memory Access Vulnerability in Google Chrome,"An out of bounds memory access vulnerability exists in the V8 engine of Google Chrome. This flaw can be potentially exploited by attackers through a specially crafted HTML page, leading to heap corruption. Such vulnerabilities may allow remote attackers to execute arbitrary code, posing significant security risks to users who visit malicious or compromised web pages.",Google,Chrome,7.5,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-22T19:22:37.153Z,0 CVE-2025-0611,https://securityvulnerability.io/vulnerability/CVE-2025-0611,Object Corruption Vulnerability in Google Chrome,"An object corruption vulnerability exists in the V8 JavaScript engine within Google Chrome. This issue can be exploited by remote attackers using a specially crafted HTML page, potentially leading to heap corruption. It is crucial for users to update their browsers to maintain security and prevent exploitation.",Google,Chrome,8.2,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-22T19:22:36.353Z,105 CVE-2025-0448,https://securityvulnerability.io/vulnerability/CVE-2025-0448,UI Spoofing Vulnerability in Google Chrome,"A vulnerability in Google Chrome prior to version 132.0.6834.83 allows remote attackers to manipulate user interface elements via specially crafted HTML pages. This exploitation can mislead users by creating false representations of legitimate content, potentially leading to unauthorized actions or data leakage. Awareness of this vulnerability is critical for maintaining secure browsing experiences.",Google,Chrome,4.3,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-15T10:58:54.689Z,0 CVE-2025-0447,https://securityvulnerability.io/vulnerability/CVE-2025-0447,Privilege Escalation Vulnerability in Google Chrome,"A vulnerability exists in Google Chrome that allows remote attackers to escalate privileges through a specially crafted HTML page. This issue is present in versions prior to 132.0.6834.83, highlighting the risks associated with unpatched software. Users are advised to update their browsers to mitigate potential threats and enhance their security posture.",Google,Chrome,8.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-15T10:58:54.496Z,0 CVE-2025-0446,https://securityvulnerability.io/vulnerability/CVE-2025-0446,UI Spoofing Vulnerability in Google Chrome Extensions,"A vulnerability exists in Google Chrome Extensions that allows a remote attacker to manipulate UI elements when a user performs specific gestures. This issue arises from an inappropriate implementation in the Extensions framework prior to version 132.0.6834.83. When a user is misled into interacting with a malicious Chrome Extension, it can result in UI spoofing, potentially tricking the user into performing actions that could compromise their security.",Google,Chrome,4.3,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-15T10:58:54.310Z,0 CVE-2025-0443,https://securityvulnerability.io/vulnerability/CVE-2025-0443,Data Validation Flaw in Google Chrome Extensions,"A vulnerability in Google Chrome prior to version 132.0.6834.83 arises from insufficient data validation in its Extensions. This flaw allows a remote attacker to exploit specific user interface gestures and perform privilege escalation by using a crafted HTML page. Users are at risk if they are persuaded to interact with malicious content, leading to elevated permissions without their consent.",Google,Chrome,8.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-15T10:58:54.090Z,0 CVE-2025-0442,https://securityvulnerability.io/vulnerability/CVE-2025-0442,UI Spoofing Vulnerability in Google Chrome Payment System,"An inappropriate implementation in the Payments feature of Google Chrome prior to version 132.0.6834.83 enables remote attackers to exploit UI spoofing. This can occur by convincing users to interact with specific user interface gestures on a specially crafted HTML page, potentially leading to manipulation of user actions and exposure to malicious intents. Users are advised to update to the latest version to mitigate this risk.",Google,Chrome,6.5,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-15T10:58:53.903Z,0 CVE-2025-0441,https://securityvulnerability.io/vulnerability/CVE-2025-0441,Improper Handling of Fenced Frames in Google Chrome by Google,"The vulnerability involves an inappropriate implementation in the Fenced Frames feature of Google Chrome, which affects versions prior to 132.0.6834.83. This flaw could allow remote attackers to exploit crafted HTML pages to access potentially sensitive information from a user’s system. The issue raises security concerns regarding the handling of isolated browsing contexts, highlighting the need for users to keep their browsers updated to ensure protection against such vulnerabilities.",Google,Chrome,6.5,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-15T10:58:53.709Z,0 CVE-2025-0440,https://securityvulnerability.io/vulnerability/CVE-2025-0440,UI Spoofing Vulnerability in Google Chrome on Windows,"A vulnerability in Google Chrome for Windows prior to version 132.0.6834.83 allows remote attackers to deceive users through UI spoofing via a crafted HTML page. This can lead to users being misled into inputting sensitive information, thus compromising security and privacy. The inappropriate implementation of the Fullscreen feature is the root cause of this issue, making users susceptible to potential phishing attacks.",Google,Chrome,6.5,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-15T10:58:53.511Z,0 CVE-2025-0439,https://securityvulnerability.io/vulnerability/CVE-2025-0439,UI Spoofing Vulnerability in Google Chrome Affects Multiple Versions,"A race condition in Google Chrome versions prior to 132.0.6834.83 creates a potential security risk allowing remote attackers to manipulate user interface elements. By convincing users to perform specific gestures while interacting with a crafted HTML page, attackers can achieve UI spoofing, which could lead to misleading information being displayed to users.",Google,Chrome,6.5,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-15T10:58:53.334Z,0 CVE-2025-0438,https://securityvulnerability.io/vulnerability/CVE-2025-0438,Stack Buffer Overflow Vulnerability in Google Chrome,"A stack buffer overflow vulnerability has been identified in Google Chrome's tracing feature, which affects versions prior to 132.0.6834.83. This vulnerability can be exploited by a remote attacker through a specially crafted HTML page, potentially leading to stack corruption and unauthorized access. Users are advised to update their Chrome browser to ensure protection against this vulnerability and maintain their online security. For more detailed information, check the official Chrome releases blog and related discussions.",Google,Chrome,8.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-15T10:58:52.981Z,0 CVE-2025-0437,https://securityvulnerability.io/vulnerability/CVE-2025-0437,Out of Bounds Read Vulnerability in Google Chrome,"An out of bounds read vulnerability exists in Google Chrome versions prior to 132.0.6834.83, enabling remote attackers to potentially exploit heap corruption through specially crafted HTML pages. This could lead to various security issues, making it essential for users to keep their browsers updated and to exercise caution when browsing untrusted sites.",Google,Chrome,8.8,HIGH,0.0006099999882280827,false,,false,false,false,,false,false,false,,2025-01-15T10:58:52.779Z,0 CVE-2025-0436,https://securityvulnerability.io/vulnerability/CVE-2025-0436,Integer Overflow Vulnerability in Google Chrome Affects Multiple Versions,"An integer overflow vulnerability in the Skia graphics library component of Google Chrome can potentially be exploited by a remote attacker. If a user opens a specially crafted HTML page, this could lead to heap corruption, allowing the attacker to execute arbitrary code in the context of the affected application. It is crucial for users to update their browsers to the latest version to mitigate this risk.",Google,Chrome,8.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-15T10:58:52.562Z,0 CVE-2025-0435,https://securityvulnerability.io/vulnerability/CVE-2025-0435,UI Spoofing Vulnerability in Google Chrome on Android,"A vulnerability in Google Chrome on Android before version 132.0.6834.83 allows remote attackers to exploit UI spoofing techniques. By crafting a malicious HTML page, an attacker can manipulate the user interface, potentially misleading users into unwittingly divulging sensitive information or executing unintended actions. This vulnerability highlights the importance of keeping browser versions up-to-date to mitigate exposure to such security risks.",Google,Chrome,6.5,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-15T10:58:52.176Z,0