Описание
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to bypass security restrictions, cause denial of service, execute arbitrary code.
Below is a complete list of vulnerabilities:
- Denial of service vulnerability in ANGLE can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Proxy can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in Skia can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Prerender can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in XR can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Video can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in CSS can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in Turbofan can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Codecs can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Graphite can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in PDFium can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Media can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Viz can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in FileSystem can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Dawn can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in Accessibility can be exploited remotely to cause denial of service.
- Security vulnerability in Passwords can be exploited to bypass security restrictions.
- Security vulnerability in CORS can be exploited to bypass security restrictions.
- Denial of service vulnerability in GPU can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Permissions can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Forms can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Cast can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in V8 can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Payments can be exploited remotely to execute arbitrary code.
Первичный источник обнаружения
Эксплуатация
Связанные продукты
Список CVE
- CVE-2026-6296 critical
- CVE-2026-6297 critical
- CVE-2026-6298 warning
- CVE-2026-6299 critical
- CVE-2026-6358 critical
- CVE-2026-6359 critical
- CVE-2026-6300 critical
- CVE-2026-6301 critical
- CVE-2026-6302 critical
- CVE-2026-6303 critical
- CVE-2026-6304 critical
- CVE-2026-6305 critical
- CVE-2026-6306 critical
- CVE-2026-6307 critical
- CVE-2026-6308 critical
- CVE-2026-6309 critical
- CVE-2026-6360 critical
- CVE-2026-6310 critical
- CVE-2026-6311 critical
- CVE-2026-6312 warning
- CVE-2026-6313 warning
- CVE-2026-6314 critical
- CVE-2026-6315 critical
- CVE-2026-6316 critical
- CVE-2026-6361 critical
- CVE-2026-6362 high
- CVE-2026-6317 critical
- CVE-2026-6363 critical
- CVE-2026-6318 critical
- CVE-2026-6319 critical
- CVE-2026-6364 high
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!