Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 8 April 2026

RSS

765 vulnerabilities published on 8 April 2026

Severity:
Google Chrome: Malicious Website Can Steal Sensitive Data
DEBIAN-CVE-2026-5888
A security issue in Google Chrome versions prior to 147.0.7727.55 makes it possible for a malicious website to access sensitive information stored in Chrome's memory. This could include passwords, log...
Google Chrome on Windows: Malicious Websites Can Bypass Download Restrictions
DEBIAN-CVE-2026-5887
If you use Google Chrome on a Windows computer, a security issue could allow a website to trick you into downloading files you shouldn't. This is a moderate risk that affects versions of Chrome prior ...
Google Chrome on Windows: Bypass Download Restrictions via Malicious Webpage
CVE-2026-5887
A security weakness in older versions of Google Chrome on Windows allows a hacker to trick the browser into downloading a file that shouldn't be allowed. This could potentially lead to malware or othe...
Google Chrome on Windows: Malicious Website Can Steal Sensitive Data
DEBIAN-CVE-2026-5885
Google Chrome on Windows versions prior to 147.0.7727.55 may be vulnerable to a security risk where a malicious website can steal sensitive information from your computer. This is a medium-severity is...
Google Chrome on Windows: Malicious Sites Can Steal Sensitive Info
CVE-2026-5885
Google Chrome on Windows versions before 147.0.7727.55 can be tricked into revealing sensitive information from its own memory by a malicious website. This could potentially expose confidential data. ...
Google Chrome: Malicious Website Can Steal Browser Control
CVE-2026-5884
A security weakness in Google Chrome allows a hacker who has control of a webpage to potentially take over your entire browser. This can happen if you visit a malicious website. To stay safe, make sur...
Google Chrome: Malicious Sites Can Run Malicious Code in Browser
DEBIAN-CVE-2026-5884
A security issue in older versions of Google Chrome could allow a hacker who has already compromised a user's browser to execute malicious code. This could lead to unauthorized access to sensitive inf...
Google Chrome allows attackers to execute code on your computer
CVE-2026-5883
A vulnerability in Google Chrome's media handling allows a hacker to use a specially crafted webpage to take control of your computer. This could allow the hacker to steal your personal data or spread...
Google Chrome: Remote Code Execution via Malicious Web Page
DEBIAN-CVE-2026-5883
A security flaw in Google Chrome allows an attacker to run malicious code on your computer if you visit a specific web page. This could lead to your data being stolen or your system being taken over. ...
Google Chrome: Malicious Websites Can Display Fake Fullscreen UI
DEBIAN-CVE-2026-5882
Attackers can create fake Chrome UI displays to trick users on outdated versions of Google Chrome. This can lead to phishing or other types of attacks. Update to the latest version of Google Chrome to...
Google Chrome: Malicious websites can trick users into revealing sensitive info
CVE-2026-5882
A software update is available to protect Google Chrome users from malicious websites that can trick them into revealing sensitive information. This vulnerability affects older versions of Google Chro...
Google Chrome allows remote attackers to bypass navigation restrictions
DEBIAN-CVE-2026-5881
Google Chrome's security feature, Local Network Access, can be bypassed by a malicious website. This means that an attacker can trick a user into visiting a website that should be blocked by the brows...
Google Chrome: Bypassing Navigation Restrictions via Malicious Webpage
CVE-2026-5881
A security issue in Google Chrome before version 147.0.7727.55 allows a cyber attacker to load web content that the user shouldn't be able to access. This could potentially allow an attacker to trick ...
Google Chrome prior to 147.0.7727.55 can be tricked into showing fake URLs
CVE-2026-5880
If an attacker has taken control of the browser's internal workings, they can make the URL bar show a fake address, potentially confusing the user. This affects Google Chrome versions prior to 147.0.7...
Google Chrome Browser: Compromised Renderer Process Can Spoof URL Bar
DEBIAN-CVE-2026-5880
A security flaw in older versions of Google Chrome allows a hacker who has already taken control of your browser to trick you into thinking you're visiting a different website. This could potentially ...
Google Chrome on Mac: Malicious Webpage Can Run Code
CVE-2026-5879
If you're using an outdated version of Google Chrome on Mac, a hacker could trick you into visiting a malicious webpage that could potentially run unauthorized code on your computer. This is a serious...
Google Chrome on Mac: Malicious Webpage Can Execute Code
DEBIAN-CVE-2026-5879
A security issue in Google Chrome on Mac, prior to version 147.0.7727.55, allows hackers to create a malicious webpage that can potentially run unauthorized code on a user's Mac. This could lead to un...
Google Chrome UI Spoofing via Malicious HTML Page
DEBIAN-CVE-2026-5878
Google Chrome users may be tricked into entering sensitive information on a fake website. This happens when a hacker creates a website that looks like a legitimate one, but is actually a fake. Users s...
Google Chrome: UI Spoofing Risk Through Malicious Web Page
CVE-2026-5878
A security issue in older versions of Google Chrome makes it possible for an attacker to create a fake user interface on a webpage, potentially tricking users into giving sensitive information. Affect...
Google Chrome: Remote Code Execution through Malicious Webpage
DEBIAN-CVE-2026-5877
A security issue in older versions of Google Chrome can allow an attacker to execute malicious code on your computer if you visit a specially crafted website. This is a significant risk because an att...
Google Chrome Prior to 147.0.7727.55: Uncontrolled Memory Access
CVE-2026-5877
A security issue in older versions of Google Chrome on Windows allows a hacker to potentially execute malicious code on a user's computer. This could happen if a user visits a specially crafted websit...
Google Chrome: Malicious website can run unauthorized code on your computer
DEBIAN-CVE-2026-5873
A security issue in Google Chrome before version 147.0.7727.55 allows a hacker to create a malicious website that can run unauthorized code on your computer. This could potentially lead to your comput...
Google Chrome: Malicious Websites Can Execute Code on Your Computer
CVE-2026-5873
A security issue in older versions of Google Chrome could allow a malicious website to execute code on your computer without your permission. This means a hacker could access your personal data or tak...
Google Chrome: Code Execution via Malicious Webpage
DEBIAN-CVE-2026-5872
A security issue in older versions of Google Chrome allows a malicious website to potentially execute unauthorized code on your computer. This issue affects users who haven't updated to the latest ver...
Google Chrome - Untrusted Code Execution via Malicious HTML Page
CVE-2026-5872
Google Chrome users are at risk of having malicious code executed on their computers if they visit a specially crafted web page. This could allow an attacker to access sensitive information or take co...