Beschreibung
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to bypass security restrictions, execute arbitrary code, cause denial of service, spoof user interface.
Below is a complete list of vulnerabilities:
- Validation of untrusted input vulnerability in Downloads can be exploited to bypass security restrictions.
- Use after free vulnerability in ANGLE can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Blink can be exploited to cause denial of service.
- Implementation vulnerability in V8 can be exploited to cause denial of service.
- Security UI vulnerability in Digital Credentials can be exploited to spoof user interface.
- Security vulnerability in Network can be exploited to bypass security restrictions.
- Security UI vulnerability can be exploited to spoof user interface.
- Security UI vulnerability in Split View can be exploited to spoof user interface.
- Out of bounds memory read vulnerability in V8 can be exploited to cause denial of service.
Ursprüngliche Informationshinweise
Ausnutzung
Public exploits exist for this vulnerability.
Betroffene Produkte
CVE Liste
- CVE-2026-0903 high
- CVE-2026-0908 critical
- CVE-2026-0901 high
- CVE-2026-0900 critical
- CVE-2026-0904 high
- CVE-2026-0905 critical
- CVE-2026-0906 critical
- CVE-2026-0907 critical
- CVE-2026-0902 critical
- CVE-2026-0899 critical
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!