Popis
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to bypass security restrictions, cause denial of service, execute arbitrary code, obtain sensitive information.
Below is a complete list of vulnerabilities:
- A remote code execution vulnerability in Blink can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Mobile can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Chromoting can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in V8 can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in ANGLE can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in ANGLE can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in V8 can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Fonts can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Media can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in SVG can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in DOM can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Fullscreen can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in ServiceWorker can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Views can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Aura can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in GPU can be exploited remotely to execute arbitrary code.
- Security vulnerability in DevTools can be exploited to bypass security restrictions.
- Denial of service vulnerability in Accessibility can be exploited remotely to cause denial of service.
- Denial of service vulnerability in DevTools can be exploited remotely to cause denial of service.
- Denial of service vulnerability in InterestGroups can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Skia can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Passwords can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in ServiceWorker can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in Skia can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Dawn can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in PresentationAPI can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in Runtime can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in WebRTC can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in MediaRecording can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in Cookies can be exploited remotely to cause denial of service.
- Denial of service vulnerability in iOS can be exploited remotely to cause denial of service.
- Security vulnerability in Downloads can be exploited to bypass security restrictions.
- Denial of service vulnerability in WebCodecs can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Popup Blocker can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Speech can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in CSS can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in SanitizerAPI can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Mobile can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Persistent Cache can be exploited remotely to cause denial of service.
- Denial of service vulnerability in COOP can be exploited remotely to cause denial of service.
- Security vulnerability in WebUI can be exploited to bypass security restrictions.
- Denial of service vulnerability in Network can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in GFX can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in WebRTC can be exploited remotely to cause denial of service.
- Security vulnerability in Extensions can be exploited to bypass security restrictions.
- Denial of service vulnerability in Omnibox can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Shared Storage can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in GPU can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Navigation can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in Navigation can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Speech can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in Permissions can be exploited remotely to cause denial of service.
- Security vulnerability in DirectSockets can be exploited to bypass security restrictions.
- Denial of service vulnerability in FileSystem can be exploited remotely to cause denial of service.
- Denial of service vulnerability in SiteIsolation can be exploited remotely to cause denial of service.
- Denial of service vulnerability in CORS can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Network can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in TopChrome can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in ORB can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Dawn can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in DevTools can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in Canvas can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Companion can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in WebAudio can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in Codecs can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in ReadingMode can be exploited remotely to execute arbitrary code.
- Security vulnerability in Autofill can be exploited to bypass security restrictions.
- Denial of service vulnerability in DataTransfer can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Updater can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in UI can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in UI can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Payments can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Chromoting can be exploited remotely to cause denial of service.
- Denial of service vulnerability in AdFilter can be exploited remotely to cause denial of service.
- Denial of service vulnerability in SSL can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Dialog can be exploited remotely to cause denial of service.
- Denial of service vulnerability in ChromeDriver can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Printing can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Audio can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in TabGroups can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Cast can be exploited remotely to cause denial of service.
- Security vulnerability in Search can be exploited to bypass security restrictions.
- Denial of service vulnerability in MHTML can be exploited remotely to cause denial of service.
- Denial of service vulnerability in FedCM can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Preload can be exploited remotely to cause denial of service.
- Information disclosure vulnerability in Media can be exploited to obtain sensitive information.
- Security vulnerability in WebApp can be exploited to bypass security restrictions.
- Script injection in UI
Oficiální doporučení
Související produkty
seznam CVE
- CVE-2026-7896 critical
- CVE-2026-7897 critical
- CVE-2026-7898 critical
- CVE-2026-7899 critical
- CVE-2026-7900 critical
- CVE-2026-7901 critical
- CVE-2026-7902 critical
- CVE-2026-7903 critical
- CVE-2026-7904 warning
- CVE-2026-7905 critical
- CVE-2026-7906 critical
- CVE-2026-7907 critical
- CVE-2026-7908 critical
- CVE-2026-7909 warning
- CVE-2026-7910 critical
- CVE-2026-7911 critical
- CVE-2026-7912 warning
- CVE-2026-7913 critical
- CVE-2026-7914 critical
- CVE-2026-7915 warning
- CVE-2026-7916 critical
- CVE-2026-7917 critical
- CVE-2026-7918 critical
- CVE-2026-7919 critical
- CVE-2026-7920 critical
- CVE-2026-7921 critical
- CVE-2026-7922 critical
- CVE-2026-7923 critical
- CVE-2026-7924 high
- CVE-2026-7925 critical
- CVE-2026-7926 critical
- CVE-2026-7927 critical
- CVE-2026-7928 critical
- CVE-2026-7929 critical
- CVE-2026-7930 critical
- CVE-2026-7931 high
- CVE-2026-7932 warning
- CVE-2026-7933 warning
- CVE-2026-7934 warning
- CVE-2026-7935 high
- CVE-2026-7936 warning
- CVE-2026-7937 warning
- CVE-2026-7938 critical
- CVE-2026-7939 high
- CVE-2026-7940 critical
- CVE-2026-7941 warning
- CVE-2026-7942 warning
- CVE-2026-7943 warning
- CVE-2026-7944 warning
- CVE-2026-7945 warning
- CVE-2026-7946 warning
- CVE-2026-7947 warning
- CVE-2026-7948 critical
- CVE-2026-7949 warning
- CVE-2026-7950 high
- CVE-2026-7951 critical
- CVE-2026-7952 warning
- CVE-2026-7953 high
- CVE-2026-7954 warning
- CVE-2026-7955 high
- CVE-2026-7956 critical
- CVE-2026-7957 critical
- CVE-2026-7958 high
- CVE-2026-7959 warning
- CVE-2026-7960 high
- CVE-2026-7961 warning
- CVE-2026-7962 high
- CVE-2026-7963 critical
- CVE-2026-7964 warning
- CVE-2026-7965 warning
- CVE-2026-7966 warning
- CVE-2026-7967 critical
- CVE-2026-7968 warning
- CVE-2026-7969 warning
- CVE-2026-7970 critical
- CVE-2026-7971 high
- CVE-2026-7972 warning
- CVE-2026-7973 critical
- CVE-2026-7974 critical
- CVE-2026-7975 critical
- CVE-2026-7976 critical
- CVE-2026-7977 high
- CVE-2026-7978 critical
- CVE-2026-7979 warning
- CVE-2026-7980 critical
- CVE-2026-7981 critical
- CVE-2026-7982 high
- CVE-2026-7983 warning
- CVE-2026-7984 critical
- CVE-2026-7985 critical
- CVE-2026-7986 warning
- CVE-2026-7987 critical
- CVE-2026-7988 critical
- CVE-2026-7989 warning
- CVE-2026-7990 critical
- CVE-2026-7991 critical
- CVE-2026-7992 critical
- CVE-2026-7993 warning
- CVE-2026-7994 critical
- CVE-2026-7995 critical
- CVE-2026-7996 warning
- CVE-2026-7997 critical
- CVE-2026-7998 high
- CVE-2026-7999 warning
- CVE-2026-8000 critical
- CVE-2026-8001 critical
- CVE-2026-8002 critical
- CVE-2026-8003 high
- CVE-2026-8004 warning
- CVE-2026-8005 warning
- CVE-2026-8006 high
- CVE-2026-8007 critical
- CVE-2026-8008 high
- CVE-2026-8009 warning
- CVE-2026-8010 high
- CVE-2026-8011 warning
- CVE-2026-8012 high
- CVE-2026-8013 warning
- CVE-2026-8014 warning
- CVE-2026-8015 high
- CVE-2026-8016 critical
- CVE-2026-8017 warning
- CVE-2026-8018 critical
- CVE-2026-8019 high
- CVE-2026-8020 high
- CVE-2026-8021 warning
- CVE-2026-8022 warning
Zobrazit více
Zjistěte statistiky zranitelností šířících se ve vaší oblasti statistics.securelist.com
Našli jste v popisu této chyby zabezpečení nepřesnost? Dej nám vědět!