Açıklama
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to bypass security restrictions, execute arbitrary code, cause denial of service, spoof user interface.
Below is a complete list of vulnerabilities:
- Validation of untrusted input vulnerability in Downloads can be exploited to bypass security restrictions.
- Use after free vulnerability in ANGLE can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Blink can be exploited to cause denial of service.
- Implementation vulnerability in V8 can be exploited to cause denial of service.
- Security UI vulnerability in Digital Credentials can be exploited to spoof user interface.
- Security vulnerability in Network can be exploited to bypass security restrictions.
- Security UI vulnerability can be exploited to spoof user interface.
- Security UI vulnerability in Split View can be exploited to spoof user interface.
- Out of bounds memory read vulnerability in V8 can be exploited to cause denial of service.
Orijinal öneriler
Kötüye kullanma
Public exploits exist for this vulnerability.
İlgili ürünler
CVE Listesi
- CVE-2026-0903 high
- CVE-2026-0908 critical
- CVE-2026-0901 high
- CVE-2026-0900 critical
- CVE-2026-0904 high
- CVE-2026-0905 critical
- CVE-2026-0906 critical
- CVE-2026-0907 critical
- CVE-2026-0902 critical
- CVE-2026-0899 critical
Daha fazlasını okuyun
Bölgenizde yayılan güvenlik açıklarının istatistiklerini öğrenin statistics.securelist.com
Bu güvenlik açığının açıklamasında bir tutarsızlık mı tespit ettiniz? Bize bildirin!