Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
https://www.theregister.com/2026/03/13/google_zeroday_chrome_update/
https://www.securityweek.com/chrome-146-update-patches-two-exploited-zero-days/
https://thehackernews.com/2026/03/google-fixes-two-chrome-zero-days.html
https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_12.html
http://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_12.html
Published: 2026-03-13
Updated: 2026-03-13
Known Exploited Vulnerability (KEV)
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Severity: Critical
Base Score: 8.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Severity: High
EPSS: 0.21893
Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.
Vulnerability Being Monitored