CoinMiner Malware – Active IOCs
May 6, 2025Multiple IBM Db2 Vulnerabilities
May 6, 2025CoinMiner Malware – Active IOCs
May 6, 2025Multiple IBM Db2 Vulnerabilities
May 6, 2025Severity
Medium
Analysis Summary
CVE-2025-4050 CVSS:8.8
Out of bounds memory access in DevTools in Google Chrome allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page.
CVE-2025-4051 CVSS:9.8
Insufficient data validation in DevTools in Google Chrome allowed a remote attacker who convinced a user to engage in specific UI gestures to bypass discretionary access control via a crafted HTML page.
CVE-2025-4052 CVSS:9.8
Inappropriate implementation in DevTools in Google Chrome allowed a remote attacker who convinced a user to engage in specific UI gestures to bypass discretionary access control via a crafted HTML page.
CVE-2025-4096 CVSS:8.8
Heap buffer overflow in HTML in Google Chrome allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Impact
- Code Execution
- Buffer Overflow
Indicators of Compromise
CVE
CVE-2025-4050
CVE-2025-4051
CVE-2025-4052
CVE-2025-4096
Affected Vendors
Affected Products
- Google Chrome - 136.0.7103.59
Remediation
Upgrade to the latest version of Chrome, available from the Google Security Advisory.