#use-after-free

[ follow ]
#chrome
fromSecurityWeek
2 months ago
Information security

Google Patches First Actively Exploited Chrome Zero-Day of 2026

An actively exploited high-severity use-after-free vulnerability in Chrome's CSS component (CVE-2026-2441) has been patched in emergency updates for Windows, Mac, and Linux.
fromThe Hacker News
2 months ago
Information security

New Chrome Zero-Day (CVE-2026-2441) Under Active Attack - Patch Released

Google patched an actively exploited high-severity CSS use-after-free zero-day (CVE-2026-2441) in Chrome and advises updating to the latest versions.
Information security
fromTechRepublic
5 days ago

Billions of Chrome Users Urged to Update After Google Patches 30 Security Flaws

Google patched 30 Chrome vulnerabilities, including four Critical flaws, requiring users to update their browsers for enhanced security.
fromComputerworld
2 months ago

Exploit available for new Chrome zero-day vulnerability, says Google

Gene Moody, field CTO at Action1, explained that, in this vulnerability, a browser frees an object, but later continues to use the stale reference memory location. Any attacker who can shape heap layout with controlled content can potentially replace the contents of that freed memory with data they control. Because this lives in the renderer, and is reachable through normal page content, he said, the trigger surface is almost absolute.
Information security
#redis
fromInfoQ
5 months ago
Information security

Redis Critical Remote Code Execution Vulnerability Discovered After 13 Years

fromInfoQ
5 months ago
Information security

Redis Critical Remote Code Execution Vulnerability Discovered After 13 Years

[ Load more ]