Description
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to bypass security restrictions, execute arbitrary code, cause denial of service, spoof user interface.
Below is a complete list of vulnerabilities:
- Validation of untrusted input vulnerability in Downloads can be exploited to bypass security restrictions.
- Use after free vulnerability in ANGLE can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Blink can be exploited to cause denial of service.
- Implementation vulnerability in V8 can be exploited to cause denial of service.
- Security UI vulnerability in Digital Credentials can be exploited to spoof user interface.
- Security vulnerability in Network can be exploited to bypass security restrictions.
- Security UI vulnerability can be exploited to spoof user interface.
- Security UI vulnerability in Split View can be exploited to spoof user interface.
- Out of bounds memory read vulnerability in V8 can be exploited to cause denial of service.
Fiches de renseignement originales
Exploitation
Public exploits exist for this vulnerability.
Produits associés
Liste CVE
- CVE-2026-0903 high
- CVE-2026-0908 critical
- CVE-2026-0901 high
- CVE-2026-0900 critical
- CVE-2026-0904 high
- CVE-2026-0905 critical
- CVE-2026-0906 critical
- CVE-2026-0907 critical
- CVE-2026-0902 critical
- CVE-2026-0899 critical
En savoir plus
Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com
Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !