Açıklama
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, spoof user interface.
Below is a complete list of vulnerabilities:
- Heap buffer overflow vulnerability in WebML can be exploited to cause denial of service.
- Integer overflow vulnerability in WebML can be exploited to cause execute arbitrary code and denial of service.
- Out of bounds read vulnerability in Web Speech can be exploited to cause denial of service.
- Use after free vulnerability in Agents can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in WebMCP can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Extensions can be exploited to cause denial of service or execute arbitrary code.
- Out of bounds memory access vulnerability in WebML can be exploited to cause denial of service.
- Use after free vulnerability in TextEncoding can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in MediaStream can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in WebMIDI can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in WindowDialog can be exploited to cause denial of service or execute arbitrary code.
- Security UI vulnerability in LookalikeChecks can be exploited to spoof user interface.
- Out of bounds read vulnerability in V8 can be exploited to cause denial of service.
- Security UI vulnerability in PictureInPicture can be exploited to spoof user interface.
- Policy enforcement vulnerability in Extensions can be exploited to cause denial of service.
- Heap buffer overflow vulnerability in ResourceTiming can be exploited to cause denial of service.
- Heap buffer overflow vulnerability in Navigation can be exploited to cause denial of service.
- Heap buffer overflow vulnerability in Skia can be exploited to cause denial of service.
- Policy enforcement vulnerability in PDF can be exploited to cause denial of service.
- Policy enforcement vulnerability in ChromeDriver can be exploited to cause denial of service.
- Security UI vulnerability in WebAppInstalls can be exploited to spoof user interface.
- Use after free vulnerability in WebView can be exploited to cause denial of service or execute arbitrary code.
- Security UI vulnerability in Downloads can be exploited to spoof user interface.
- Policy enforcement vulnerability in Clipboard can be exploited to cause denial of service.
- Policy enforcement vulnerability in DevTools can be exploited to cause denial of service.
Orijinal öneriler
İlgili ürünler
CVE Listesi
- CVE-2026-3913 critical
- CVE-2026-3914 critical
- CVE-2026-3915 critical
- CVE-2026-3916 critical
- CVE-2026-3917 critical
- CVE-2026-3918 critical
- CVE-2026-3919 critical
- CVE-2026-3920 critical
- CVE-2026-3921 critical
- CVE-2026-3922 critical
- CVE-2026-3923 critical
- CVE-2026-3924 critical
- CVE-2026-3925 warning
- CVE-2026-3926 critical
- CVE-2026-3927 warning
- CVE-2026-3928 warning
- CVE-2026-3929 warning
- CVE-2026-3930 high
- CVE-2026-3931 critical
- CVE-2026-3932 critical
- CVE-2026-3934 high
- CVE-2026-3935 high
- CVE-2026-3936 critical
- CVE-2026-3937 high
- CVE-2026-3938 warning
- CVE-2026-3939 high
- CVE-2026-3940 high
- CVE-2026-3941 warning
- CVE-2026-3942 warning
Daha fazlasını okuyun
Bölgenizde yayılan güvenlik açıklarının istatistiklerini öğrenin statistics.securelist.com
Bu güvenlik açığının açıklamasında bir tutarsızlık mı tespit ettiniz? Bize bildirin!