No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 15 May 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Remote Sandbox Escape via Use‑After‑Free in Chrome Windows | chromium-browser: chromium-browser: Use after free in Core |
| Weaknesses | CWE-825 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 14 May 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Remote Sandbox Escape via Use‑After‑Free in Chrome Windows | |
| First Time appeared |
Google
Google chrome |
|
| Vendors & Products |
Google
Google chrome |
Thu, 14 May 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 14 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Use after free in Core in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium) | |
| Weaknesses | CWE-416 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Chrome
Published:
Updated: 2026-05-15T03:57:11.663Z
Reserved: 2026-05-14T05:40:25.388Z
Link: CVE-2026-8574
Updated: 2026-05-14T21:03:50.584Z
Status : Awaiting Analysis
Published: 2026-05-14T20:17:19.727
Modified: 2026-05-14T22:16:50.903
Link: CVE-2026-8574
OpenCVE Enrichment
Updated: 2026-05-14T22:45:31Z