Project Subscriptions
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-6273-1 | chromium security update |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 18 May 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apple
Apple macos Linux Linux linux Kernel Microsoft Microsoft windows |
|
| CPEs | cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Apple
Apple macos Linux Linux linux Kernel Microsoft Microsoft windows |
Fri, 15 May 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | chromium-browser: chromium-browser: Use after free in FileSystem | |
| Weaknesses | CWE-825 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 15 May 2026 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Google
Google chrome |
|
| Vendors & Products |
Google
Google chrome |
Thu, 14 May 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Use-After-Free in Chrome FileSystem Enabling Possible Sandbox Escape |
Thu, 14 May 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Use-After-Free in Chrome FileSystem Enabling Possible Sandbox Escape | |
| Metrics |
cvssV3_1
|
Thu, 14 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Use after free in FileSystem in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical) | |
| Weaknesses | CWE-416 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Chrome
Published:
Updated: 2026-05-15T03:56:53.683Z
Reserved: 2026-05-14T05:40:10.867Z
Link: CVE-2026-8512
Updated: 2026-05-14T21:00:46.958Z
Status : Analyzed
Published: 2026-05-14T20:17:11.830
Modified: 2026-05-18T18:33:35.250
Link: CVE-2026-8512
OpenCVE Enrichment
Updated: 2026-05-15T13:30:45Z
Debian DSA