Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 8 April 2026

RSS

685 vulnerabilities published on 8 April 2026

Severity:
Google Chrome allows malicious downloads to bypass security restrictions
CVE-2026-5900
A bug in Google Chrome's download feature could allow a hacker to trick the browser into allowing malicious downloads, even if the user has set restrictions. This could potentially let a cyber attacke...
Google Chrome: Malicious Code Can Be Injected via User Interaction
CVE-2026-5899
If a user interacts with a specially crafted webpage in Google Chrome prior to a certain version, an attacker may be able to inject malicious code, which could lead to unauthorized actions on the user...
Google Chrome iOS: Spoofing Attack Possible via Crafted Webpage
CVE-2026-5898
A security issue in older versions of Google Chrome on iOS allows an attacker to create a fake webpage that may trick you into revealing sensitive information or clicking on malicious links. This issu...
Google Chrome: Malicious downloads can spoof Chrome's UI
CVE-2026-5897
Prior versions of Google Chrome had a security weakness that could be exploited by a malicious website to trick users into performing unintended actions. This issue has been fixed in version 147.0.772...
Google Chrome: Malicious websites can bypass download restrictions
CVE-2026-5896
A security issue in Google Chrome allows a hacker to trick a user into bypassing download restrictions on their computer by manipulating the browser with a specially crafted web page. This could poten...
Google Chrome on iOS URL bar spoofing vulnerability prior to 147.0.7727.55
CVE-2026-5895
A security flaw in older versions of Google Chrome on iOS allows a hacker to trick users into thinking they are visiting a legitimate website by altering the URL bar. This could be used to trick users...
Google Chrome PDF Bypass Allows Remote Code Injection
CVE-2026-5894
A security issue in older versions of Google Chrome allows a hacker to bypass navigation restrictions on a website, potentially allowing them to inject malicious code. This could allow them to manipul...
Google Chrome: Malicious web page can crash browser
CVE-2026-5893
A security issue in Google Chrome's V8 engine can be exploited by a malicious webpage to crash the browser, potentially allowing an attacker to take control of the system. This issue affects Google Ch...
Google Chrome: PWA Installation Allowed Without User Consent
CVE-2026-5892
A security gap in Google Chrome allowed an attacker who had taken control of a user's browser to install a Progressive Web App without the user's permission. This could have allowed the attacker to ac...
Google Chrome: UI spoofing possible through compromised renderer process
CVE-2026-5891
An attacker who has compromised the Chrome browser could trick users into thinking they are seeing legitimate content. This could be done by a malicious webpage. To protect against this, update to the...
Google Chrome: Malicious Websites Can Steal Sensitive Data
CVE-2026-5890
A security issue in Google Chrome versions prior to 147.0.7727.55 allows a malicious website to potentially steal sensitive information from your computer. This is a medium-risk issue, but it's still ...
Google Chrome: Sensitive PDF info exposed via brute-force attack
CVE-2026-5889
A security issue in Google Chrome's PDF viewer allows an attacker to access sensitive information from encrypted PDFs. This is a concern because it could allow unauthorized access to confidential data...
Google Chrome: Attacker can steal sensitive data from your computer
CVE-2026-5888
A security issue in older versions of Google Chrome could allow an attacker to access sensitive information on your computer by tricking you into visiting a malicious website. This affects Google Chro...
Google Chrome on Windows: Bypass Download Restrictions via Malicious Webpage
CVE-2026-5887
A security weakness in older versions of Google Chrome on Windows allows a hacker to trick the browser into downloading a file that shouldn't be allowed. This could potentially lead to malware or othe...
Google Chrome on Mac: Memory Leak via Malicious Website
CVE-2026-5886
A security flaw in older versions of Google Chrome on Mac allows a hacker to access sensitive information from your computer's memory if you visit a specially crafted website. This could potentially e...
Google Chrome on Windows: Malicious Sites Can Steal Sensitive Info
CVE-2026-5885
Google Chrome on Windows versions before 147.0.7727.55 can be tricked into revealing sensitive information from its own memory by a malicious website. This could potentially expose confidential data. ...
Google Chrome: Malicious Website Can Steal Browser Control
CVE-2026-5884
A security weakness in Google Chrome allows a hacker who has control of a webpage to potentially take over your entire browser. This can happen if you visit a malicious website. To stay safe, make sur...
Google Chrome allows attackers to execute code on your computer
CVE-2026-5883
A vulnerability in Google Chrome's media handling allows a hacker to use a specially crafted webpage to take control of your computer. This could allow the hacker to steal your personal data or spread...
Google Chrome: Malicious websites can trick users into revealing sensitive info
CVE-2026-5882
A software update is available to protect Google Chrome users from malicious websites that can trick them into revealing sensitive information. This vulnerability affects older versions of Google Chro...
Google Chrome: Bypassing Navigation Restrictions via Malicious Webpage
CVE-2026-5881
A security issue in Google Chrome before version 147.0.7727.55 allows a cyber attacker to load web content that the user shouldn't be able to access. This could potentially allow an attacker to trick ...
Google Chrome prior to 147.0.7727.55 can be tricked into showing fake URLs
CVE-2026-5880
If an attacker has taken control of the browser's internal workings, they can make the URL bar show a fake address, potentially confusing the user. This affects Google Chrome versions prior to 147.0.7...
Google Chrome on Mac: Malicious Webpage Can Run Code
CVE-2026-5879
If you're using an outdated version of Google Chrome on Mac, a hacker could trick you into visiting a malicious webpage that could potentially run unauthorized code on your computer. This is a serious...
Google Chrome: UI Spoofing Risk Through Malicious Web Page
CVE-2026-5878
A security issue in older versions of Google Chrome makes it possible for an attacker to create a fake user interface on a webpage, potentially tricking users into giving sensitive information. Affect...
Google Chrome Prior to 147.0.7727.55: Uncontrolled Memory Access
CVE-2026-5877
A security issue in older versions of Google Chrome on Windows allows a hacker to potentially execute malicious code on a user's computer. This could happen if a user visits a specially crafted websit...
Google Chrome leaks sensitive data from other websites
CVE-2026-5876
If you use an outdated version of Google Chrome, an attacker could create a malicious website that reveals sensitive information from other websites you visit, such as your account details or private ...