cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2025-1923,https://securityvulnerability.io/vulnerability/CVE-2025-1923,UI Spoofing Vulnerability in Google Chrome,"An improper implementation in permission prompts within Google Chrome versions prior to 134.0.6998.35 enables attackers to exploit users by convincing them to install malicious extensions. This flaw allows for UI spoofing attacks, where an attacker can craft deceptive interfaces that mislead users into providing sensitive information or performing unintended actions. Users must ensure their browsers are updated to mitigate potential exploitation of this vulnerability.",Google,Chrome,4.3,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-03-05T03:48:37.668Z,0 CVE-2025-1922,https://securityvulnerability.io/vulnerability/CVE-2025-1922,UI Spoofing Vulnerability in Google Chrome for Android,"A vulnerability in Google Chrome for Android enables remote attackers to perform UI spoofing by persuading users to execute specific gestures on a crafted HTML page. This flaw can potentially lead to deceptive interactions by altering the appearance of the user interface, creating a risk for unsuspecting users.",Google,Chrome,4.3,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-03-05T03:48:37.428Z,0 CVE-2025-1921,https://securityvulnerability.io/vulnerability/CVE-2025-1921,Information Disclosure Vulnerability in Google Chrome,An inappropriate implementation in the Media Stream component of Google Chrome prior to version 134.0.6998.35 could potentially allow a remote attacker to gain unauthorized access to sensitive information pertaining to a user's peripheral devices through a specially crafted HTML page.,Google,Chrome,6.5,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-03-05T03:48:37.204Z,0 CVE-2025-1919,https://securityvulnerability.io/vulnerability/CVE-2025-1919,Out of Bounds Read Vulnerability in Google Chrome,"A vulnerability in Google Chrome allows remote attackers to exploit an out of bounds read through a specially crafted HTML page. This flaw enables attackers to access memory locations that are not intended to be accessible, potentially leading to unauthorized information disclosure or execution of arbitrary code. Users are advised to update their Chrome browsers to the latest version to mitigate exposure to this issue.",Google,Chrome,8.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-03-05T03:48:36.844Z,0 CVE-2025-1918,https://securityvulnerability.io/vulnerability/CVE-2025-1918,Out of Bounds Read Vulnerability in Google Chrome PDFium Component,"An out of bounds read vulnerability in the PDFium component of Google Chrome could allow a remote attacker to exploit this flaw by crafting a malicious PDF file. If successfully executed, this vulnerability could lead to unauthorized access to memory, potentially compromising the confidentiality and integrity of the system.",Google,Chrome,8.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-03-05T03:48:36.637Z,0 CVE-2025-1917,https://securityvulnerability.io/vulnerability/CVE-2025-1917,UI Spoofing Vulnerability in Google Chrome for Android,"A vulnerability in the implementation of the Browser UI in Google Chrome for Android allows remote attackers to exploit UI spoofing via a specially crafted HTML page. This flaw could result in misleading visual cues for users, potentially compromising their experience and security while navigating the web. Ensuring that browsers are kept up-to-date is critical in mitigating such threats.",Google,Chrome,4.3,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-03-05T03:48:36.375Z,0 CVE-2025-1916,https://securityvulnerability.io/vulnerability/CVE-2025-1916,Use After Free Vulnerability in Google Chrome Profiles,"A use after free vulnerability in the Profiles component of Google Chrome prior to version 134.0.6998.35 allows attackers to exploit heap corruption scenarios. This vulnerability can be triggered if a user is convinced to install a malicious browser extension. By crafting a specific HTML page, an attacker may leverage this flaw to execute arbitrary code or compromise user systems, showcasing the importance of safeguarding against untrusted extensions and maintaining updated web browsers.",Google,Chrome,8.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-03-05T03:48:36.146Z,0 CVE-2025-1915,https://securityvulnerability.io/vulnerability/CVE-2025-1915,Improper Pathname Limitation in Google Chrome DevTools for Windows,"A security flaw exists in Google Chrome's DevTools for Windows that allows an attacker to exploit improper pathname restrictions. If a user installs a malicious extension, the attacker can bypass file access limitations to the user's system, potentially leading to unauthorized file access or disclosure of sensitive information.",Google,Chrome,8.1,HIGH,0.0004400000034365803,false,,false,false,false,,false,false,false,,2025-03-05T03:48:35.884Z,0 CVE-2025-1914,https://securityvulnerability.io/vulnerability/CVE-2025-1914,Out of Bounds Read Vulnerability in Google Chrome,An out of bounds read vulnerability exists in the V8 JavaScript engine of Google Chrome. This issue allows remote attackers to access memory outside the intended boundaries through specially crafted HTML pages. Exploitation of this vulnerability may enable an attacker to read sensitive data or cause unexpected behavior in the application.,Google,Chrome,8.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-03-05T03:48:35.445Z,392 CVE-2025-1006,https://securityvulnerability.io/vulnerability/CVE-2025-1006,Use After Free Vulnerability in Google Chrome Network Module,"A use after free vulnerability was identified in the network module of Google Chrome prior to version 133.0.6943.126. This flaw can allow a remote attacker to exploit heap memory corruption issues through specially crafted web applications, potentially compromising system integrity or leading to an unexpected application state.",Google,Chrome,8.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-19T16:55:31.747Z,0 CVE-2025-1426,https://securityvulnerability.io/vulnerability/CVE-2025-1426,Heap Buffer Overflow Vulnerability in Google Chrome for Android,"A heap buffer overflow vulnerability has been identified in Google Chrome for Android, potentially allowing remote attackers to exploit heap corruption through a specifically crafted HTML page. This flaw can lead to significant security risks, enabling unauthorized access and manipulation of data.",Google,Chrome,8.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-19T16:55:31.252Z,0 CVE-2025-0999,https://securityvulnerability.io/vulnerability/CVE-2025-0999,Heap Buffer Overflow in Google Chrome by Google,"A significant security flaw was identified in the V8 engine within Google Chrome, where a heap buffer overflow could occur. This vulnerability enables remote attackers to manipulate heap memory through specially crafted HTML pages, potentially leading to heap corruption. Users of Google Chrome versions prior to 133.0.6943.126 are at risk and should ensure their browsers are updated to mitigate threats.",Google,Chrome,8.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-19T16:55:30.675Z,582 CVE-2025-0998,https://securityvulnerability.io/vulnerability/CVE-2025-0998,Out of Bounds Memory Access in Google Chrome by Google,"A vulnerability exists in Google Chrome due to out of bounds memory access in the V8 JavaScript engine. This flaw enables remote attackers to execute arbitrary code within a sandboxed environment by tricking users into loading specially crafted HTML pages, potentially leading to significant security breaches. Users are encouraged to update their browsers to mitigate the risks associated with this vulnerability.",Google,Chrome,9.6,CRITICAL,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-15T01:17:26.235Z,0 CVE-2025-0997,https://securityvulnerability.io/vulnerability/CVE-2025-0997,Use After Free Vulnerability in Google Chrome Navigation,A use after free vulnerability has been identified in the Navigation component of Google Chrome versions prior to 133.0.6943.98. This flaw can be exploited by remote attackers to perform heap corruption through crafted Chrome Extensions. Users are urged to update their browsers to mitigate potential security threats associated with this vulnerability.,Google,Chrome,8.1,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-15T01:17:25.637Z,0 CVE-2025-0996,https://securityvulnerability.io/vulnerability/CVE-2025-0996,Browser UI Spoofing Vulnerability in Google Chrome for Android,"A vulnerability in the implementation of the Browser UI in Google Chrome for Android allows a malicious actor to spoof the Omnibox content through a specially crafted HTML page. This exploit could mislead users by displaying deceptive URLs, potentially facilitating phishing attacks. Users of Google Chrome on Android versions prior to 133.0.6943.98 are at risk and should consider updating to maintain security.",Google,Chrome,5.4,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-15T01:17:25.209Z,0 CVE-2025-0995,https://securityvulnerability.io/vulnerability/CVE-2025-0995,Use After Free Vulnerability in Google Chrome by Google,A use after free vulnerability in the V8 engine of Google Chrome allows remote attackers to exploit heap corruption by crafting malicious HTML pages. This flaw can lead to unauthorized actions within the browser and potentially compromise user security. Users of affected versions are advised to upgrade to the latest version to mitigate risks associated with this vulnerability.,Google,Chrome,8.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-15T01:17:24.705Z,216 CVE-2025-0451,https://securityvulnerability.io/vulnerability/CVE-2025-0451,UI Spoofing Vulnerability in Google Chrome Extensions,"A vulnerability exists in Google Chrome's Extensions API that allows remote attackers to manipulate UI elements through crafted Chrome Extensions. By convincing a user to execute specific UI gestures, the attacker can display misleading information, potentially causing users to divulge sensitive information or interact with unintended interfaces. This flaw highlights the importance of user vigilance and the need for timely updates to protect against such exploits.",Google,Chrome,6.3,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-04T18:53:06.962Z,0 CVE-2025-0445,https://securityvulnerability.io/vulnerability/CVE-2025-0445,Use After Free Vulnerability in Google Chrome,"A use after free vulnerability has been identified in the V8 engine of Google Chrome, which allows remote attackers to exploit heap corruption. This can be triggered by a specially crafted HTML page, potentially leading to unauthorized actions or data exposure. The issue affects Google Chrome versions before 133.0.6943.53, highlighting the importance of keeping your browser updated to enhance security and protect against potential threats.",Google,Chrome,5.4,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-04T18:53:06.689Z,174 CVE-2025-0444,https://securityvulnerability.io/vulnerability/CVE-2025-0444,Use After Free Vulnerability in Google Chrome,"A use after free vulnerability exists in the Skia graphics library within Google Chrome prior to version 133.0.6943.53. This flaw can potentially allow a remote attacker to exploit heap corruption through a specially crafted HTML page, leading to unauthorized actions or compromise of system integrity. Users are advised to update to the latest version to mitigate this risk.",Google,Chrome,6.3,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-04T18:53:06.437Z,126 CVE-2025-0762,https://securityvulnerability.io/vulnerability/CVE-2025-0762,Use After Free Vulnerability in Google Chrome DevTools,"A use after free vulnerability in the DevTools of Google Chrome allows remote attackers to exploit heap corruption through a specially crafted Chrome Extension. This issue affects versions prior to 132.0.6834.159, potentially allowing an attacker to manipulate memory and execute arbitrary code. Users are advised to upgrade to the latest version to mitigate this security risk.",Google,Chrome,8.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-29T10:33:45.673Z,0 CVE-2025-0612,https://securityvulnerability.io/vulnerability/CVE-2025-0612,Out of Bounds Memory Access Vulnerability in Google Chrome,"An out of bounds memory access vulnerability exists in the V8 engine of Google Chrome. This flaw can be potentially exploited by attackers through a specially crafted HTML page, leading to heap corruption. Such vulnerabilities may allow remote attackers to execute arbitrary code, posing significant security risks to users who visit malicious or compromised web pages.",Google,Chrome,7.5,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-22T19:22:37.153Z,0 CVE-2025-0611,https://securityvulnerability.io/vulnerability/CVE-2025-0611,Object Corruption Vulnerability in Google Chrome,"An object corruption vulnerability exists in the V8 JavaScript engine within Google Chrome. This issue can be exploited by remote attackers using a specially crafted HTML page, potentially leading to heap corruption. It is crucial for users to update their browsers to maintain security and prevent exploitation.",Google,Chrome,8.2,HIGH,0.0004299999854993075,false,,true,false,true,2025-01-27T11:04:47.000Z,false,false,false,,2025-01-22T19:22:36.353Z,105 CVE-2025-0448,https://securityvulnerability.io/vulnerability/CVE-2025-0448,UI Spoofing Vulnerability in Google Chrome,"A vulnerability in Google Chrome prior to version 132.0.6834.83 allows remote attackers to manipulate user interface elements via specially crafted HTML pages. This exploitation can mislead users by creating false representations of legitimate content, potentially leading to unauthorized actions or data leakage. Awareness of this vulnerability is critical for maintaining secure browsing experiences.",Google,Chrome,4.3,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-15T10:58:54.689Z,0 CVE-2025-0447,https://securityvulnerability.io/vulnerability/CVE-2025-0447,Privilege Escalation Vulnerability in Google Chrome,"A vulnerability exists in Google Chrome that allows remote attackers to escalate privileges through a specially crafted HTML page. This issue is present in versions prior to 132.0.6834.83, highlighting the risks associated with unpatched software. Users are advised to update their browsers to mitigate potential threats and enhance their security posture.",Google,Chrome,8.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-15T10:58:54.496Z,0 CVE-2025-0446,https://securityvulnerability.io/vulnerability/CVE-2025-0446,UI Spoofing Vulnerability in Google Chrome Extensions,"A vulnerability exists in Google Chrome Extensions that allows a remote attacker to manipulate UI elements when a user performs specific gestures. This issue arises from an inappropriate implementation in the Extensions framework prior to version 132.0.6834.83. When a user is misled into interacting with a malicious Chrome Extension, it can result in UI spoofing, potentially tricking the user into performing actions that could compromise their security.",Google,Chrome,4.3,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-15T10:58:54.310Z,0