Исправленные уязвимости

Мы исправили следующие уязвимости из базы CVE, обнаруженные в ядре Chromium и в Яндекс Браузере.

Уязвимости в Яндекс Браузере

24.7.1

Идентификатор уязвимости Описание (EN) Описание (RU) Критичность
CVE-2024-6473 DLL Hijacking in Yandex Browser. DLL-Hijacking в Яндекс Браузере. Critical

22.5.0

Идентификатор уязвимости Описание (EN) Описание (RU) Критичность
CVE-2021-25261 An elevation of privilege vulnerability exists in Yandex Browser prior to 22.5.0.826. В версиях ранее 22.5.0.826 присутствует уязвимость повышения привилегий локальным пользователем. High

22.3.3

Идентификатор уязвимости Описание (EN) Описание (RU) Критичность
CVE-2022-28226 An elevation of privilege vulnerability exists in Yandex Browser prior to 22.3.3.801. В версиях ранее 22.3.3.801 присутствует уязвимость повышения привилегий локальным пользователем. High
CVE-2022-28225 An elevation of privilege vulnerability exists in Yandex Browser prior to 22.3.3.684. В версиях ранее 22.3.3.684 присутствует уязвимость повышения привилегий локальным пользователем. High

21.9.0

Идентификатор уязвимости Описание (EN) Описание (RU) Критичность
CVE-2021-25263 An elevation of privilege vulnerability exists in Yandex Browser prior to 21.9.0.390. В версиях ранее 21.9.0.390 присутствует уязвимость повышения привилегий локальным пользователем. High

17.4.1

Идентификатор уязвимости Описание (EN) Описание (RU) Критичность
CVE-2017-7327 Yandex Browser installer for Desktop before 17.4.1 has a DLL Hijacking Vulnerability because an untrusted search path is used for dnsapi.dll, winmm.dll, ntmarta.dll, cryptbase.dll or profapi.dll. Файл-установщик Яндекс Браузера был уязвим к DLL-Hijacking из-за отсутствия проверок загрузки путей для dnsapi.dll, winmm.dll, ntmarta.dll, cryptbase.dll or profapi.dll. High

17.4.0

Идентификатор уязвимости Описание (EN) Описание (RU) Критичность
CVE-2017-7326 Race condition issue in Yandex Browser for Android before 17.4.0.16 allowed a remote attacker to potentially exploit memory corruption via a crafted HTML page. Состояние гонки (race-condition) в Яндекc Браузер для Android позволяло эксплуатировать уязвимость повреждения памяти, используя специально подготовленную HTML-страницу. High

17.1.1

Идентификатор уязвимости Описание (EN) Описание (RU) Критичность
CVE-2016-8508 Yandex Browser for desktop before 17.1.1.227 does not show Protect (similar to Safebrowsing in Chromium) warnings in web-sites with special content-type, which could be used by remote attacker for prevention Protect warning on own malicious web-site. Уведомление о подозрительном контенте, что технология Protect в Яндекс Браузере не отображается для определенных типов контента. Medium

16.10.0

Идентификатор уязвимости Описание (EN) Описание (RU) Критичность
CVE-2016-8507 Yandex Browser for iOS before 16.10.0.2357 does not properly restrict processing of facetime:// URLs, which allows remote attackers to initiate facetime-call without user's approval and obtain video and audio data from a device via a crafted web site. Яндекс Браузер для iOS некорректно осуществлял проверку URL со схемой facetime://, в результате чего атакующий получал возможность инициировать видеозвонок без уведомления пользователя. Medium

16.9

Идентификатор уязвимости Описание (EN) Описание (RU) Критичность
CVE-2016-8503 Yandex Protect Anti-phishing warning in Yandex Browser for desktop from version 16.7 to 16.9 could be used by remote attacker for brute-forcing passwords from important web-resource with special JavaScript. Уведомление, что технология Антифишинг может быть использована для перебора паролей пользователя. High
CVE-2017-7325 Yandex Browser before 16.9.0 allows remote attackers to spoof the address bar via window.open. Уязвимость позволяла атакующему подменить значение адресной строки Яндекс Браузер c помощью вызова window.open. High

16.6

Идентификатор уязвимости Описание (EN) Описание (RU) Критичность
CVE-2016-8504 CSRF of synchronization form in Yandex Browser for desktop before version 16.6 could be used by remote attacker to steal saved data in browser profile. CSRF в механизме синхронизации форм в Яндекс Браузере позволяет атакующему получить доступ к сохраненным данным профиля пользователя. Medium
CVE-2016-8505 XSS in Yandex Browser BookReader in Yandex browser for desktop for versions before 16.6. could be used by remote attacker for evaluation arbitrary javascript code. XSS в расширении BookReader в Яндекс Браузере позволяет атакующему выполнить произвольный javascript код. Medium

16.2

Идентификатор уязвимости Описание (EN) Описание (RU) Критичность
CVE-2016-8502 Yandex Protect Anti-phishing warning in Yandex Browser for desktop from version 15.12.0 to 16.2 could be used by remote attacker for brute-forcing passwords from important web-resource with special JavaScript. Уведомление, что технология Антифишинг может быть использована для перебора паролей пользователя. High
CVE-2016-8506 XSS in Yandex Browser Translator in Yandex browser for desktop for versions from 15.12 to 16.2 could be used by remote attacker for evaluation arbitrary javascript code. XSS в расширении Переводчик в Яндекс Браузере позволяет атакующему выполнить произвольный javascript код. Medium

15.12

Идентификатор уязвимости Описание (EN) Описание (RU) Критичность
CVE-2016-8501 Security WiFi bypass in Yandex Browser from version 15.10 to 15.12 allows remote attacker to sniff traffic in open or WEP-protected wi-fi networks despite of special security mechanism is enabled. Уязвимость в технологии Безопасный WiFi в Яндекс Браузере позволяет атакующему осуществлять перехват сетевого трафика в открытых или WEP-сетях. Medium

Уязвимости в ядре Chromium

25.6.1

Идентификатор уязвимости Описание (EN) Критичность
CVE-2025-6554 Type Confusion in V8. High
CVE-2025-6558 Incorrect validation of untrusted input in ANGLE and GPU. High
CVE-2025-7656 Integer overflow in V8. High
CVE-2025-7657 Use after free in WebRTC. High

25.4.1

Идентификатор уязвимости Описание (EN) Критичность
CVE-2025-2476 Use after free in Lens. Critical
CVE-2025-5068 Use after free in Blink. Medium
CVE-2025-5419 Out of bounds read and write in V8. High

25.2.4

Идентификатор уязвимости Описание (EN) Критичность
CVE-2025-2783 Incorrect handle provided in unspecified circumstances in Mojo on Windows. High
CVE-2025-24201 Out of bounds write in GPU on Mac. High

25.2.1

Идентификатор уязвимости Описание (EN) Критичность
CVE-2025-0434 Out of bounds memory access in V8. High
CVE-2025-0435 Inappropriate implementation in Navigation. High
CVE-2025-0436 Integer overflow in Skia. High
CVE-2025-0437 Out of bounds read in Metrics. High
CVE-2025-0438 Stack buffer overflow in Tracing. High
CVE-2025-0439 Race in Frames. Medium
CVE-2025-0440 Inappropriate implementation in Fullscreen. Medium
CVE-2025-0441 Inappropriate implementation in Fenced Frames. Medium
CVE-2025-0442 Inappropriate implementation in Payments. Medium
CVE-2025-0443 Insufficient data validation in Extensions. Medium
CVE-2025-0446 Inappropriate implementation in Extensions. Low
CVE-2025-0447 Inappropriate implementation in Navigation. Low
CVE-2025-0448 Inappropriate implementation in Compositing. Low
CVE-2025-0611 Object corruption in V8. High
CVE-2025-0612 Out of bounds memory access in V8. High
CVE-2025-0762 Use after free in DevTools. Medium
CVE-2025-0995 Use after free in V8. High
CVE-2025-0996 Inappropriate implementation in Browser UI. High
CVE-2025-0997 Use after free in Navigation. High
CVE-2025-0998 Out of bounds memory access in V8. High
CVE-2025-2783 Incorrect handle provided in unspecified circumstances in Mojo. High

24.12.4

Идентификатор уязвимости Описание (EN) Критичность
CVE-2024-10487 Out of bounds write in Dawn. Critical
CVE-2024-10488 Use after free in WebRTC. High
CVE-2024-10826 Use after free in Family Experiences. High
CVE-2024-10827 Use after free in Serial. High
CVE-2024-12694 Use after free in Compositing. High
CVE-2025-0291 Type Confusion in V8. High
CVE-2025-0762 Use after free in DevTools. Medium

24.10.4

Идентификатор уязвимости Описание (EN) Критичность
CVE-2024-7964 Use after free in Passwords. High
CVE-2024-7965 Inappropriate implementation in V8. High
CVE-2024-7966 Out of bounds memory access in Skia. High
CVE-2024-7967 Heap buffer overflow in Fonts. High
CVE-2024-7968 Use after free in Autofill. High
CVE-2024-7969 Type Confusion in V8. High
CVE-2024-7970 Out of bounds write in V8. High
CVE-2024-7971 Type confusion in V8. High
CVE-2024-7972 Inappropriate implementation in V8. Medium
CVE-2024-7973 Heap buffer overflow in PDFium. Medium
CVE-2024-7974 Insufficient data validation in V8 API. Medium
CVE-2024-7975 Inappropriate implementation in Permissions. Medium
CVE-2024-7976 Inappropriate implementation in FedCM. Medium
CVE-2024-7977 Insufficient data validation in Installer. Medium
CVE-2024-7978 Insufficient policy enforcement in Data Transfer. Medium
CVE-2024-7979 Insufficient data validation in Installer. Medium
CVE-2024-7980 Insufficient data validation in Installer. Medium
CVE-2024-7981 Inappropriate implementation in Views. Low
CVE-2024-8033 Inappropriate implementation in WebApp Installs. Low
CVE-2024-8034 Inappropriate implementation in Custom Tabs. Low
CVE-2024-8035 Inappropriate implementation in Extensions. Low
CVE-2024-8193 Heap buffer overflow in Skia. High
CVE-2024-8194 Type Confusion in V8. High
CVE-2024-8198 Heap buffer overflow in Skia. High
CVE-2024-8362 Use after free in WebAudio. High
CVE-2024-8636 Heap buffer overflow in Skia. High
CVE-2024-8637 Use after free in Media Router. High
CVE-2024-8638 Type Confusion in V8. High
CVE-2024-8639 Use after free in Autofill. High
CVE-2024-10229 Inappropriate implementation in Extensions. High
CVE-2024-10487 Out of bounds write in Dawn. Critical
CVE-2024-10488 Use after free in WebRTC. High

24.7.1

Идентификатор уязвимости Описание (EN) Критичность
CVE-2024-6772 Inappropriate implementation in V8. High
CVE-2024-6773 Inappropriate implementation in V8. High
CVE-2024-6774 Use after free in Screen Capture. High
CVE-2024-6775 Use after free in Media Stream. High
CVE-2024-6776 Use after free in Audio. High
CVE-2024-6777 Use after free in Navigation. High
CVE-2024-6778 Race in DevTools. High
CVE-2024-6779 Out of bounds memory access in V8. High
CVE-2024-6990 Uninitialized Use in Dawn. Critical
CVE-2024-7965 Inappropriate implementation in V8. High
CVE-2024-7971 Type confusion in V8. High

24.6.4

Идентификатор уязвимости Описание (EN) Критичность
CVE-2024-4558 Use after free in ANGLE. High
CVE-2024-4559 Heap buffer overflow in WebAudio. High
CVE-2024-5496 Use after free in Media Session. High
CVE-2024-5497 Out of bounds memory access in Browser UI. High
CVE-2024-5498 Use after free in Presentation API. High
CVE-2024-5499 Out of bounds write in Streams API. High

24.6.1

Идентификатор уязвимости Описание (EN) Критичность
CVE-2024-4331 Use after free in Picture In Picture. High
CVE-2024-4368 Use after free in Dawn. High

24.4.3

Идентификатор уязвимости Описание (EN) Критичность
CVE-2024-4058 Type confusion in ANGLE. Critical
CVE-2024-4059 Out of bounds read in V8. High
CVE-2024-4060 Use after free in Dawn. High
CVE-2024-4671 Use after free in Visuals. High
CVE-2024-4947 Type Confusion in V8. High
CVE-2024-5274 Type Confusion in V8. High

24.1.1

Идентификатор уязвимости Описание (EN) Критичность
CVE-2024-0333 Insufficient data validation in Extensions. High

23.11.1

Идентификатор уязвимости Описание (EN) Критичность
CVE-2024-0519 Out of bounds memory access in V8. High
CVE-2024-0518 Type confusion in V8. High
CVE-2024-0517 Out of bounds write in V8. High

23.9.5

Идентификатор уязвимости Описание (EN) Критичность
CVE-2023-5996 Use after free in WebAudio. High
CVE-2023-5997 Use after free in Garbage Collection. High
CVE-2023-6112 Use after free in Navigation. High
CVE-2023-6345 Integer overflow in Skia. High
CVE-2023-5480 Inappropriate implementation in Payments. High
CVE-2023-5849 Integer overflow in USB. High
CVE-2023-5482 Insufficient data validation in USB. High

23.9.1

Идентификатор уязвимости Описание (EN) Критичность
CVE-2023-4863 Heap buffer overflow in libwebp. Critical
CVE-2023-2312 Use after free in Offline. High
CVE-2023-4349 Use after free in Device Trust Connectors. High
CVE-2023-4350 Inappropriate implementation in Fullscreen. High
CVE-2023-4351 Use after free in Network. High
CVE-2023-4352 Type Confusion in V8. High
CVE-2023-4353 Heap buffer overflow in ANGLE. High
CVE-2023-4354 Heap buffer overflow in Skia. High
CVE-2023-4355 Out of bounds memory access in V8. High
CVE-2023-4356 Use after free in Audio. Medium
CVE-2023-4357 Insufficient validation of untrusted input in XML. Medium
CVE-2023-4358 Use after free in DNS. Medium
CVE-2023-4359 Inappropriate implementation in App Launcher. Medium
CVE-2023-4360 Inappropriate implementation in Color. Medium
CVE-2023-4361 Inappropriate implementation in Autofill. Medium
CVE-2023-4362 Heap buffer overflow in Mojom IDL. Medium
CVE-2023-4363 Inappropriate implementation in WebShare. Medium
CVE-2023-4364 Inappropriate implementation in Permission Prompts. Medium
CVE-2023-4365 Inappropriate implementation in Fullscreen. Medium
CVE-2023-4366 Use after free in Extensions. Medium
CVE-2023-4367 Insufficient policy enforcement in Extensions API. Medium
CVE-2023-4368 Insufficient policy enforcement in Extensions API. Medium

23.7.5

Идентификатор уязвимости Описание (EN) Критичность
CVE-2023-4359 Inappropriate implementation in App Launcher. Medium
CVE-2023-4368 Insufficient policy enforcement in Extensions API. Medium
CVE-2023-4362 Heap buffer overflow in Mojom IDL. Medium
CVE-2023-4353 Heap buffer overflow in ANGLE. High
CVE-2023-4350 Inappropriate implementation in Fullscreen. High
CVE-2023-4354 Heap buffer overflow in Skia. High
CVE-2023-4365 Inappropriate implementation in Fullscreen. Medium
CVE-2023-2312 Use after free in Offline. High
CVE-2023-4358 Use after free in DNS. Medium
CVE-2023-4363 Inappropriate implementation in WebShare. Medium
CVE-2023-4367 Insufficient policy enforcement in Extensions API. Medium
CVE-2023-4357 Insufficient validation of untrusted input in XML. Medium
CVE-2023-4351 Use after free in Network. High
CVE-2023-4364 Inappropriate implementation in Permission Prompts. Medium
CVE-2023-4360 Inappropriate implementation in Color. Medium
CVE-2023-4349 Use after free in Device Trust Connectors. High
CVE-2023-4361 Inappropriate implementation in Autofill. Meidum
CVE-2023-4366 Use after free in Extensions. Meidum
CVE-2023-4356 Use after free in Audio. Meidum
CVE-2023-4352 Type confusion in V8. High

23.7.0

Идентификатор уязвимости Описание (EN) Критичность
CVE-2023-3421 Use after free in Media. High
CVE-2023-3422 Use after free in Guest View. High
CVE-2023-3420 Type Confusion in V8. High
CVE-2023-3214 Use after free in Autofill payments. Critical
CVE-2023-3215 Use after free in WebRTC. High
CVE-2023-3216 Type Confusion in V8. High
CVE-2023-3217 Use after free in WebXR. High
CVE-2023-3079 Type Confusion in V8. High
CVE-2023-2929 Out of bounds write in Swiftshader. High
CVE-2023-2930 Use after free in Extensions. High
CVE-2023-3598 Out of bounds read and write in ANGLE. High
CVE-2023-2931 Use after free in PDF. High
CVE-2023-2932 Use after free in PDF. High
CVE-2023-2933 Use after free in PDF. High
CVE-2023-2934 Out of bounds memory access in Mojo. High
CVE-2023-2935 Type Confusion in V8. High
CVE-2023-2936 Type Confusion in V8. High
CVE-2023-2937 Inappropriate implementation in Picture In Picture. Medium
CVE-2023-2938 Inappropriate implementation in Picture In Picture. Medium
CVE-2023-2939 Insufficient data validation in Installer. Medium
CVE-2023-2940 Inappropriate implementation in Downloads. Medium
CVE-2023-2941 Inappropriate implementation in Extensions API. Low
CVE-2023-2721 Use after free in Navigation. Critical
CVE-2023-2722 Use after free in Autofill UI. High
CVE-2023-2723 Use after free in DevTools. High
CVE-2023-2724 Type Confusion in V8. High
CVE-2023-2725 Use after free in Guest View. High
CVE-2023-2726 Inappropriate implementation in WebApp Installs. Medium
CVE-2023-2459 Inappropriate implementation in Prompts. Medium
CVE-2023-2460 Insufficient validation of untrusted input in Extensions. Medium
CVE-2023-2461 Use after free in OS Inputs. Medium
CVE-2023-2462 Inappropriate implementation in Prompts. Medium
CVE-2023-2463 Inappropriate implementation in Full Screen Mode. Medium
CVE-2023-2464 Inappropriate implementation in PictureInPicture. Medium
CVE-2023-2465 Inappropriate implementation in CORS. Medium
CVE-2023-2466 Inappropriate implementation in Prompts. Low
CVE-2023-2467 Inappropriate implementation in Prompts. Low
CVE-2023-2468 Inappropriate implementation in PictureInPicture. Low

23.5.1

Идентификатор уязвимости Описание (EN) Критичность
CVE-2023-2133 Out of bounds memory access in Service Worker API. High
CVE-2023-2134 Out of bounds memory access in Service Worker API. High
CVE-2023-2135 Use after free in DevTools. High
CVE-2023-2136 Integer overflow in Skia. High
CVE-2023-2137 Heap buffer overflow in sqlite. Medium
CVE-2023-2033 Type Confusion in V8. High
CVE-2023-1810 Heap buffer overflow in Visuals. High
CVE-2023-1811 Use after free in Frames. High
CVE-2023-2313 Inappropriate implementation in Sandbox. High
CVE-2023-1812 Out of bounds memory access in DOM Bindings. Medium
CVE-2023-1813 Inappropriate implementation in Extensions. Medium
CVE-2023-1814 Insufficient validation of untrusted input in Safe Browsing. Medium
CVE-2023-1815 Use after free in Networking APIs. Medium
CVE-2023-1816 Incorrect security UI in Picture In Picture. Medium
CVE-2023-1817 Insufficient policy enforcement in Intents. Medium
CVE-2023-2311 Insufficient policy enforcement in File System API. Medium
CVE-2023-1818 Use after free in Vulkan. Medium
CVE-2023-1819 Out of bounds read in Accessibility. Medium
CVE-2023-1820 Heap buffer overflow in Browser History. Medium
CVE-2023-1821 Inappropriate implementation in WebShare. Low
CVE-2023-1822 Incorrect security UI in Navigation. Low
CVE-2023-1823 Inappropriate implementation in FedCM. Low
CVE-2023-1528 Use after free in Passwords. High
CVE-2023-1529 Out of bounds memory access in WebHID. High
CVE-2023-1530 Use after free in PDF. High
CVE-2023-1531 Use after free in ANGLE. High
CVE-2023-1532 Out of bounds read in GPU Video. High
CVE-2023-1533 Use after free in WebProtect. High
CVE-2023-1534 Out of bounds read in ANGLE. High
CVE-2023-1213 Use after free in Swiftshader. High
CVE-2023-1214 Type Confusion in V8. High
CVE-2023-1215 Type Confusion in CSS. High
CVE-2023-1216 Use after free in DevTools. High
CVE-2023-1217 Stack buffer overflow in Crash reporting. High
CVE-2023-1218 Use after free in WebRTC. High
CVE-2023-1219 Heap buffer overflow in Metrics. High
CVE-2023-1220 Heap buffer overflow in UMA. High
CVE-2023-1221 Insufficient policy enforcement in Extensions API. Medium
CVE-2023-1222 Heap buffer overflow in Web Audio API. Medium
CVE-2023-1223 Insufficient policy enforcement in Autofill. Medium
CVE-2023-1224 Insufficient policy enforcement in Web Payments API. Medium
CVE-2023-1225 Insufficient policy enforcement in Navigation. Medium
CVE-2023-1226 Insufficient policy enforcement in Web Payments API. Medium
CVE-2023-1227 Use after free in Core. Medium
CVE-2023-1228 Insufficient policy enforcement in Intents. Medium
CVE-2023-1229 Inappropriate implementation in Permission prompts. Medium
CVE-2023-1230 Inappropriate implementation in WebApp Installs. Medium
CVE-2023-1231 Inappropriate implementation in Autofill. Medium
CVE-2023-2314 Insufficient data validation in DevTools. Low
CVE-2023-1232 Insufficient policy enforcement in Resource Timing. Low
CVE-2023-1233 Insufficient policy enforcement in Resource Timing. Low
CVE-2023-1234 Inappropriate implementation in Intents. Low
CVE-2023-1235 Type Confusion in DevTools. Low
CVE-2023-1236 Inappropriate implementation in Internals. Low

23.3.1

Идентификатор уязвимости Описание (EN) Критичность
CVE-2023-0941 Use after free in Prompts. Critical
CVE-2023-0927 Use after free in Web Payments API. High
CVE-2023-0928 Use after free in SwiftShader. High
CVE-2023-0929 Use after free in Vulkan. High
CVE-2023-0930 Heap buffer overflow in Video. High
CVE-2023-0931 Use after free in Video. High
CVE-2023-0932 Use after free in WebRTC. High
CVE-2023-0933 Integer overflow in PDF. Medium
CVE-2023-0696 Type Confusion in V8. High
CVE-2023-0697 Inappropriate implementation in Full screen mode. High
CVE-2023-0698 Out of bounds read in WebRTC. High
CVE-2023-0699 Use after free in GPU. Medium
CVE-2023-0700 Inappropriate implementation in Download. Medium
CVE-2023-0701 Heap buffer overflow in WebUI. Medium
CVE-2023-0702 Type Confusion in Data Transfer. Medium
CVE-2023-0703 Type Confusion in DevTools. Medium
CVE-2023-0704 Insufficient policy enforcement in DevTools. Low
CVE-2023-0705 Integer overflow in Core. Low
CVE-2023-0471 Use after free in WebTransport. High
CVE-2023-0472 Use after free in WebRTC. High
CVE-2023-0473 Type Confusion in ServiceWorker API. Medium
CVE-2023-0474 Use after free in GuestView. Medium
CVE-2022-4926 Insufficient policy enforcement in Intents. Medium
CVE-2023-0128 Use after free in Overview Mode. High
CVE-2023-0129 Heap buffer overflow in Network Service. High
CVE-2023-0130 Inappropriate implementation in Fullscreen API. Medium
CVE-2023-0131 Inappropriate implementation in iframe Sandbox. Medium
CVE-2023-0132 Inappropriate implementation in Permission prompts. Medium
CVE-2023-0133 Inappropriate implementation in Permission prompts. Medium
CVE-2023-0134 Use after free in Cart. Medium
CVE-2023-0135 Use after free in Cart. Medium
CVE-2023-0136 Inappropriate implementation in Fullscreen API. Medium
CVE-2023-0137 Heap buffer overflow in Platform Apps. Medium
CVE-2023-0138 Heap buffer overflow in libphonenumber. Low
CVE-2023-0139 Insufficient validation of untrusted input in Downloads. Low
CVE-2023-0140 Inappropriate implementation in File System API. Low
CVE-2023-0141 Insufficient policy enforcement in CORS. Low

Написать в службу поддержки

Также вы можете перейти на сервис

favicon Яндекс Браузера для организаций



Полезные ссылки

Промостраница Яндекс Браузера для организаций