Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome on Windows prior to 134.0.6998.177 allowed a remote attacker to perform a sandbox escape via a malicious file. (Chromium security severity: High)
https://www.securityweek.com/chrome-138-update-patches-zero-day-vulnerability/
https://www.securityweek.com/chrome-137-update-patches-high-severity-vulnerabilities/
https://thehackernews.com/2025/06/google-chrome-zero-day-cve-2025-2783.html
https://www.theregister.com/2025/06/03/google_chrome_zero_day_emergency_fix/
https://www.securityweek.com/google-researchers-find-new-chrome-zero-day/
https://thehackernews.com/2025/06/new-chrome-zero-day-actively-exploited.html
https://thehackernews.com/2025/05/new-chrome-vulnerability-enables-cross.html
https://www.theregister.com/2025/03/28/google_kaspersky_mozilla/
https://therecord.media/firefox-sandbox-vulnerability-similar-chrome-zero-day
https://thehackernews.com/2025/03/mozilla-patches-critical-firefox-bug.html
https://therecord.media/russian-media-academia-targeted-in-espionage-campaign
https://www.darkreading.com/cyberattacks-data-breaches/google-patches-chrome-zero-day-exploited-apt
https://thehackernews.com/2025/03/zero-day-alert-google-releases-chrome.html
https://www.securityweek.com/google-patches-chrome-sandbox-escape-zero-day-caught-by-kaspersky/
https://securelist.com/operation-forumtroll/115989/
https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_25.html