Kaspersky ID:
KLA90880
Detect Date:
02/10/2026
Updated:
02/12/2026

Description

Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. Use after free vulnerability in CSS can be exploited to cause denial of service or execute arbitrary code.
  2. Heap buffer overflow vulnerability in Codecs can be exploited to cause denial of service.
  3. Implementation vulnerability in WebGPU can be exploited to cause denial of service.
  4. Policy enforcement vulnerability in Frames can be exploited to cause denial of service.
  5. Implementation vulnerability in Animation can be exploited to cause denial of service.
  6. Implementation vulnerability in PictureInPicture can be exploited to cause denial of service.
  7. Race condition vulnerability in DevTools can be exploited to cause denial of service or execute arbitrary code.
  8. Implementation vulnerability in File input can be exploited to cause denial of service.
  9. Use after free vulnerability in Ozone can be exploited to cause denial of service or execute arbitrary code.
  10. Implementation vulnerability in Downloads can be exploited to cause denial of service.

Original advisories

Related products

CVE list

  • CVE-2026-2313
    critical
  • CVE-2026-2314
    critical
  • CVE-2026-2315
    critical
  • CVE-2026-2316
    unknown
  • CVE-2026-2317
    unknown
  • CVE-2026-2318
    unknown
  • CVE-2026-2319
    critical
  • CVE-2026-2320
    unknown
  • CVE-2026-2321
    unknown
  • CVE-2026-2322
    warning
  • CVE-2026-2323
    warning

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Do you want to save your changes?
Your message has been sent successfully.