Kaspersky ID:
KLA90880
Fecha de detección:
02/10/2026
Actualizado:
02/13/2026

Descripción

Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. Use after free vulnerability in CSS can be exploited to cause denial of service or execute arbitrary code.
  2. Heap buffer overflow vulnerability in Codecs can be exploited to cause denial of service.
  3. Implementation vulnerability in WebGPU can be exploited to cause denial of service.
  4. Policy enforcement vulnerability in Frames can be exploited to cause denial of service.
  5. Implementation vulnerability in Animation can be exploited to cause denial of service.
  6. Implementation vulnerability in PictureInPicture can be exploited to cause denial of service.
  7. Race condition vulnerability in DevTools can be exploited to cause denial of service or execute arbitrary code.
  8. Implementation vulnerability in File input can be exploited to cause denial of service.
  9. Use after free vulnerability in Ozone can be exploited to cause denial of service or execute arbitrary code.
  10. Implementation vulnerability in Downloads can be exploited to cause denial of service.

Notas informativas originales

Productos relacionados

Lista CVE

  • CVE-2026-2313
    critical
  • CVE-2026-2314
    critical
  • CVE-2026-2315
    critical
  • CVE-2026-2316
    high
  • CVE-2026-2317
    high
  • CVE-2026-2318
    high
  • CVE-2026-2319
    critical
  • CVE-2026-2320
    high
  • CVE-2026-2321
    critical
  • CVE-2026-2322
    high
  • CVE-2026-2323
    warning

Leer más

Conozca las estadísticas de las vulnerabilidades que se propagan en su región statistics.securelist.com

¿Has encontrado algún error en la descripción de esta vulnerabilidad? ¡Háznoslo saber!
Kaspersky Next:
ciberseguridad redefinida
Leer más
Nuevo Kaspersky
¡Su vida digital merece una protección completa!
Leer más
Do you want to save your changes?
Your message has been sent successfully.