Przejdź do treści

#google

7 artykułów

Alerty bezpieczeństwa 1.04.2026

CVE-2026-5281: Wysoka podatność w Dawn (Google)

Google Dawn contains an use-after-free vulnerability that could allow a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. This vulnerability c...

Alerty bezpieczeństwa 1.04.2026

CVE-2026-5288: Podatność w Google Chrome — natychmiastowa aktualizacja wymagana

Use after free in WebView in Google Chrome on Android prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted H...

Alerty bezpieczeństwa 1.04.2026

CVE-2026-5289: Podatność w Google Chrome — natychmiastowa aktualizacja wymagana

Use after free in Navigation in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page...

Alerty bezpieczeństwa 1.04.2026

CVE-2026-5290: Podatność w Google Chrome — natychmiastowa aktualizacja wymagana

Use after free in Compositing in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML pag...

Alerty bezpieczeństwa 19.12.2025

CVE-2026-3909: Nieznana podatność w Skia (Google)

Google Skia contains an out-of-bounds write vulnerability that could allow a remote attacker to perform out of bounds memory access via a crafted HTML page. This vulnerability affects Google Chrome an...

Alerty bezpieczeństwa 18.12.2025

CVE-2026-3910: Nieznana podatność w Chromium V8 (Google)

Google Chromium V8 contains an improper restriction of operations within the bounds of a memory buffer vulnerability that could allow a remote attacker to execute arbitrary code inside a sandbox via a...

Alerty bezpieczeństwa 3.12.2025

CVE-2026-2441: Wysoka podatność w Chromium (Google)

Google Chromium CSS zawiera podatność użycia po zwolnieniu pamięci (use-after-free) która może pozwolić zdalnemu atakującemu na potentially exploit heap corruption za pomocą spreparowanego HTML page. ...