Tag
Chromium Use-After-Free Vulnerability in ANGLE (CVE-2026-7359)
2 rules 1 CVEA use-after-free vulnerability in the ANGLE graphics engine within Chromium (CVE-2026-7359) allows for potential exploitation in Google Chrome and Microsoft Edge.
Chromium Use-After-Free Vulnerability in GPU Component (CVE-2026-7357)
2 rules 1 TTP 1 CVECVE-2026-7357 is a use-after-free vulnerability in the GPU component of Chromium that also affects Microsoft Edge, potentially leading to arbitrary code execution.
Chromium Use-After-Free Vulnerability in Cast (CVE-2026-7338)
2 rules 1 CVECVE-2026-7338 is a use-after-free vulnerability in the Cast component of Chromium, affecting Google Chrome and Microsoft Edge, potentially leading to arbitrary code execution.
Multiple Vulnerabilities in Google Chrome
2 rules 5 TTPs 5 CVEsMultiple vulnerabilities in Google Chrome could allow an attacker to execute arbitrary code, bypass security mechanisms, disclose and manipulate data, and cause a denial-of-service condition.
Google Chrome V8 Type Confusion Vulnerability (CVE-2026-6363)
2 rules 2 TTPs 1 CVEA type confusion vulnerability (CVE-2026-6363) in Google Chrome's V8 JavaScript engine before version 147.0.7727.101 allows a remote attacker to potentially perform out-of-bounds memory access via a crafted HTML page.
Google Chrome Turbofan Type Confusion Vulnerability (CVE-2026-6301)
2 rules 1 TTP 1 CVEA type confusion vulnerability in Google Chrome's Turbofan component (CVE-2026-6301) allows a remote attacker to execute arbitrary code within a sandbox by exploiting a crafted HTML page, impacting system integrity and availability.
Google Chrome Sandbox Escape via Uninitialized Use in Accessibility (CVE-2026-6311)
2 rules 1 TTP 1 CVE 1 IOCA remote attacker who has compromised the renderer process in Google Chrome on Windows prior to version 147.0.7727.101 can potentially perform a sandbox escape via a crafted HTML page due to an uninitialized use in accessibility, as tracked by CVE-2026-6311.
Google Chrome GPU Out-of-Bounds Write Vulnerability (CVE-2026-6314)
2 rules 1 TTP 1 CVEGoogle Chrome versions prior to 147.0.7727.101 are vulnerable to an out-of-bounds write in the GPU process (CVE-2026-6314), allowing a remote attacker with GPU process compromise to potentially perform a sandbox escape via a crafted HTML page.
Google Chrome CSS Use-After-Free Vulnerability (CVE-2026-6300)
1 rule 1 TTP 1 CVEA use-after-free vulnerability in Google Chrome's CSS engine (CVE-2026-6300) allows a remote attacker to execute arbitrary code within a sandbox by exploiting a crafted HTML page.
Google Chrome Proxy Use-After-Free Vulnerability (CVE-2026-6297)
2 rules 1 TTP 1 CVECVE-2026-6297 is a critical use-after-free vulnerability in the Proxy component of Google Chrome before version 147.0.7727.101, enabling a privileged network attacker to potentially achieve sandbox escape via a crafted HTML page.
Google Chrome Device Bound Session Credentials (DBSC) Mitigates Cookie Theft
2 rules 1 TTPGoogle's rollout of Device Bound Session Credentials (DBSC) in Chrome 146 for Windows, with a future release planned for macOS, cryptographically binds authentication sessions to the user's device, rendering stolen session cookies unusable and mitigating credential access.
Google Chrome WebAudio Heap Buffer Overflow Vulnerability (CVE-2026-4673)
2 rules 1 TTPA remote attacker can exploit a heap buffer overflow vulnerability (CVE-2026-4673) in Google Chrome's WebAudio component before version 146.0.7680.165 by crafting a malicious HTML page, potentially leading to an out-of-bounds memory write and arbitrary code execution.
CVE-2026-4675: Google Chrome WebGL Heap Buffer Overflow Vulnerability
2 rules 2 TTPsA heap buffer overflow vulnerability (CVE-2026-4675) exists in Google Chrome's WebGL implementation prior to version 146.0.7680.165, allowing a remote attacker to perform an out-of-bounds memory read via a specially crafted HTML page, potentially leading to information disclosure or arbitrary code execution.
Google Chrome WebGPU Use-After-Free Vulnerability (CVE-2026-4678)
2 rules 1 TTPA use-after-free vulnerability in Google Chrome's WebGPU component (CVE-2026-4678) allows a remote attacker to execute arbitrary code within a sandbox by crafting a malicious HTML page, affecting Chrome versions prior to 146.0.7680.165.
Google Chrome WebAudio Out-of-Bounds Read Vulnerability (CVE-2026-4677)
2 rules 1 TTP 1 IOCA remote attacker can trigger an out-of-bounds memory read in Google Chrome's WebAudio implementation by crafting a malicious HTML page (CVE-2026-4677), affecting versions prior to 146.0.7680.165.
Google Chrome Use-After-Free Vulnerability (CVE-2026-4676)
2 rules 1 TTPA use-after-free vulnerability (CVE-2026-4676) in Google Chrome before 146.0.7680.165 allows a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
Google Chrome Font Integer Overflow Vulnerability (CVE-2026-4679)
2 rules 3 TTPsA remote attacker can perform an out-of-bounds memory write on Google Chrome by exploiting an integer overflow in the Fonts component via a crafted HTML page in versions prior to 146.0.7680.165.
Google Chrome FedCM Use-After-Free Vulnerability (CVE-2026-4680)
2 rules 1 TTP 1 IOCA use-after-free vulnerability in Google Chrome's FedCM component (CVE-2026-4680) allows a remote attacker to execute arbitrary code within a sandbox by exploiting a crafted HTML page.
Google Chrome Out-of-Bounds Read Vulnerability (CVE-2026-4674)
2 rules 1 TTP 2 IOCsA remote attacker can exploit an out-of-bounds read vulnerability (CVE-2026-4674) in Google Chrome versions prior to 146.0.7680.165 to achieve out-of-bounds memory access via a crafted HTML page, impacting confidentiality, integrity, and availability.
VoidStealer Steals Secrets by Debugging Chrome
2 rules 1 TTPVoidStealer leverages Chrome debugging capabilities to extract sensitive information, such as credentials and session cookies, directly from the browser's memory.
CISA Adds Google Skia and Chromium V8 Vulnerabilities to KEV Catalog
2 rules 3 TTPsCISA added CVE-2026-3909, an out-of-bounds write vulnerability in Google Skia, and CVE-2026-3910, an unspecified vulnerability in Google Chromium V8 to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation, highlighting the need for timely remediation.
Unauthorized Access to Chrome Local State File
2 rules 1 TTPDetection of non-Chrome processes accessing the Chrome 'Local State' file, potentially leading to extraction of the master key used for decrypting saved passwords.