説明
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to bypass security restrictions, execute arbitrary code, cause denial of service, spoof user interface.
Below is a complete list of vulnerabilities:
- Validation of untrusted input vulnerability in Downloads can be exploited to bypass security restrictions.
- Use after free vulnerability in ANGLE can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Blink can be exploited to cause denial of service.
- Implementation vulnerability in V8 can be exploited to cause denial of service.
- Security UI vulnerability in Digital Credentials can be exploited to spoof user interface.
- Security vulnerability in Network can be exploited to bypass security restrictions.
- Security UI vulnerability can be exploited to spoof user interface.
- Security UI vulnerability in Split View can be exploited to spoof user interface.
- Out of bounds memory read vulnerability in V8 can be exploited to cause denial of service.
オリジナルアドバイザリー
エクスプロイテーション
Public exploits exist for this vulnerability.
関連製品
CVEリスト
- CVE-2026-0903 high
- CVE-2026-0908 critical
- CVE-2026-0901 high
- CVE-2026-0900 critical
- CVE-2026-0904 high
- CVE-2026-0905 critical
- CVE-2026-0906 critical
- CVE-2026-0907 critical
- CVE-2026-0902 critical
- CVE-2026-0899 critical
も参照してください
お住まいの地域に広がる脆弱性の統計をご覧ください statistics.securelist.com
この脆弱性についての記述に不正確な点がありますか? お知らせください!