Search for packages
| purl | pkg:deb/debian/chromium@139.0.7258.127-1~deb13u1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1myc-2zvg-4ufz | Inappropriate implementation in Extensions in Google Chrome prior to 139.0.7258.66 allowed a remote attacker who convinced a user to engage in specific UI gestures to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low) |
CVE-2025-8581
|
| VCID-8hq7-bca9-xkhw | Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution. |
CVE-2025-8882
|
| VCID-9uq1-attd-6fg9 | Inappropriate implementation in Picture In Picture in Google Chrome prior to 139.0.7258.66 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium) |
CVE-2025-8577
|
| VCID-chwf-3ees-vucx | Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution. |
CVE-2025-8881
|
| VCID-cwab-m23u-n7at | Inappropriate implementation in Permissions in Google Chrome prior to 139.0.7258.66 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low) |
CVE-2025-8583
|
| VCID-es45-v7v3-gkcy | Use after free in Extensions in Google Chrome prior to 139.0.7258.66 allowed a remote attacker to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: Medium) |
CVE-2025-8576
|
| VCID-gj24-r1kr-1qg7 | Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution. |
CVE-2025-8880
|
| VCID-k57k-h41e-hbay | Inappropriate implementation in Picture In Picture in Google Chrome prior to 139.0.7258.66 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low) |
CVE-2025-8579
|
| VCID-ke3x-ajgw-s3av | Use after free in Cast in Google Chrome prior to 139.0.7258.66 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium) |
CVE-2025-8578
|
| VCID-qff9-euj8-u7f4 | Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution. |
CVE-2025-8901
|
| VCID-qzrp-z4g2-yyhp | Inappropriate implementation in Filesystems in Google Chrome prior to 139.0.7258.66 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low) |
CVE-2025-8580
|
| VCID-tfc2-749m-sqh1 | Insufficient validation of untrusted input in Core in Google Chrome prior to 139.0.7258.66 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Low) |
CVE-2025-8582
|
| VCID-tkvr-d1xj-ykar | chromium-browser: Side-channel information leakage in Navigation and Loading |
CVE-2025-13992
|
| VCID-u9mq-tb44-4kbc | Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution. |
CVE-2025-8879
|