
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A Use-after-free vulnerability (CVE-2025-0762) was discovered in the DevTools component of Google Chrome versions prior to 132.0.6834.159. The vulnerability was reported by security researcher Sakana.S on December 18, 2024, and was officially disclosed on January 28, 2025. This security flaw affects Google Chrome browsers across Windows, Mac, and Linux platforms (Chrome Release).
The vulnerability is classified as a Use-after-free (CWE-416) issue in Chrome's DevTools component. It received a CVSS v3.1 Base Score of 8.8 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, indicating a serious security risk. The vulnerability could be exploited through a crafted Chrome Extension, potentially leading to heap corruption (NVD).
The vulnerability could potentially allow remote attackers to execute arbitrary code, cause denial of service, or disclose information through heap corruption exploitation. The high CVSS score indicates significant potential impact on the confidentiality, integrity, and availability of affected systems (Debian Security).
Google has released version 132.0.6834.159/160 for Windows and Mac, and version 132.0.6834.159 for Linux to address this vulnerability. Users are advised to update their Chrome browsers to these versions or later. The update is being rolled out over several days/weeks (Chrome Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”