No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 14 May 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Use-After-Free in Chrome's Mojo Enables Potential Sandbox Escape |
Thu, 14 May 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Google
Google chrome |
|
| Vendors & Products |
Google
Google chrome |
Thu, 14 May 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 14 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Use after free in Mojo in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High) | |
| Weaknesses | CWE-416 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Chrome
Published:
Updated: 2026-05-14T21:10:15.357Z
Reserved: 2026-05-14T05:40:13.592Z
Link: CVE-2026-8523
Updated: 2026-05-14T21:03:54.622Z
Status : Awaiting Analysis
Published: 2026-05-14T20:17:13.080
Modified: 2026-05-14T22:16:46.400
Link: CVE-2026-8523
No data.
OpenCVE Enrichment
Updated: 2026-05-14T22:15:16Z