Descripción
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to bypass security restrictions, cause denial of service, execute arbitrary code.
Below is a complete list of vulnerabilities:
- Denial of service vulnerability in ANGLE can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Proxy can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in Skia can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Prerender can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in XR can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Video can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in CSS can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in Turbofan can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Codecs can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Graphite can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in PDFium can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Media can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Viz can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in FileSystem can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Dawn can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in Accessibility can be exploited remotely to cause denial of service.
- Security vulnerability in Passwords can be exploited to bypass security restrictions.
- Security vulnerability in CORS can be exploited to bypass security restrictions.
- Denial of service vulnerability in GPU can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Permissions can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Forms can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Cast can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in V8 can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Payments can be exploited remotely to execute arbitrary code.
Notas informativas originales
Productos relacionados
Lista CVE
- CVE-2026-6296 unknown
- CVE-2026-6297 unknown
- CVE-2026-6298 unknown
- CVE-2026-6299 unknown
- CVE-2026-6358 unknown
- CVE-2026-6359 unknown
- CVE-2026-6300 unknown
- CVE-2026-6301 unknown
- CVE-2026-6302 unknown
- CVE-2026-6303 unknown
- CVE-2026-6304 unknown
- CVE-2026-6305 unknown
- CVE-2026-6306 unknown
- CVE-2026-6307 unknown
- CVE-2026-6308 unknown
- CVE-2026-6309 unknown
- CVE-2026-6360 unknown
- CVE-2026-6310 unknown
- CVE-2026-6311 unknown
- CVE-2026-6312 unknown
- CVE-2026-6313 unknown
- CVE-2026-6314 unknown
- CVE-2026-6315 unknown
- CVE-2026-6316 unknown
- CVE-2026-6361 unknown
- CVE-2026-6362 unknown
- CVE-2026-6317 unknown
- CVE-2026-6363 unknown
- CVE-2026-6318 unknown
- CVE-2026-6319 unknown
- CVE-2026-6364 unknown
Leer más
Conozca las estadísticas de las vulnerabilidades que se propagan en su región statistics.securelist.com
¿Has encontrado algún error en la descripción de esta vulnerabilidad? ¡Háznoslo saber!