Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

Chrome — Vulnerabilities & Security Advisories 2645

All 2645 CVE vulnerabilities found in Chrome, with AI-generated Chinese analysis, references, and POCs.

This page catalogs Common Weakness Enumeration (CWE) vulnerabilities affecting Google Chrome, a widely used web browser developed by Google. It aggregates security flaws ranging from critical memory corruption issues and sandbox escapes to less severe cross-site scripting bugs and permission model inconsistencies. The database includes data points spanning from initial discovery reports through to official vendor patches and long-term resolution status, ensuring a comprehensive historical view of the product's security landscape. By consulting this aggregation, security professionals and researchers can effectively track Google’s advisory history to understand the pace and nature of their remediation efforts. Users can also explore specific weakness classes to see how they manifest within the Chrome architecture, identifying patterns that might indicate systemic risks across different versions. Additionally, the page allows for a detailed lookup of a product’s vulnerability history, enabling teams to assess the impact of specific CVEs on their deployments and verify if their current version is protected against known exploits. This resource serves as a neutral, factual reference for auditing and risk assessment, providing clear visibility into past security incidents without speculation. The information is structured to facilitate quick analysis of vulnerability trends, helping organizations make informed decisions about patch management and browser deployment policies. It is essential for maintaining a secure browsing environment by keeping stakeholders informed about the evolving threat landscape specific to one of the most prevalent software applications globally.

Vendor: Google

CVE IDTitleCVSSSeverityPublished
CVE-2026-7338 Google Chrome 资源管理错误漏洞 CWE-416 8.0AIHighAI2026-04-28
CVE-2026-7342 Google Chrome 资源管理错误漏洞 CWE-416 8.8AIHighAI2026-04-28
CVE-2026-7346 Google Chrome 安全漏洞 8.8AIHighAI2026-04-28
CVE-2026-7345 Google Chrome 输入验证错误漏洞 CWE-20 9.6AICriticalAI2026-04-28
CVE-2026-7347 Google Chrome 资源管理错误漏洞 CWE-416 8.8AIHighAI2026-04-28
CVE-2026-7337 Google Chrome 安全漏洞 CWE-843 8.8AIHighAI2026-04-28
CVE-2026-7336 Google Chrome 资源管理错误漏洞 CWE-416 8.8AIHighAI2026-04-28
CVE-2026-7335 Google Chrome 资源管理错误漏洞 CWE-416 8.8AIHighAI2026-04-28
CVE-2026-7348 Google Chrome 资源管理错误漏洞 CWE-416 8.8AIHighAI2026-04-28
CVE-2026-7349 Google Chrome 资源管理错误漏洞 CWE-416 8.0AIHighAI2026-04-28
CVE-2026-7350 Google Chrome 资源管理错误漏洞 CWE-416 9.6AICriticalAI2026-04-28
CVE-2026-7351 Google Chrome 竞争条件问题漏洞 CWE-362 3.1AILowAI2026-04-28
CVE-2026-7353 Google Chrome 安全漏洞 CWE-122 9.6AICriticalAI2026-04-28
CVE-2026-7352 Google Chrome 资源管理错误漏洞 CWE-416 9.6AICriticalAI2026-04-28
CVE-2026-7357 Google Chrome 资源管理错误漏洞 CWE-416 8.8AIHighAI2026-04-28
CVE-2026-7354 Google Chrome 安全漏洞 9.6AICriticalAI2026-04-28
CVE-2026-7356 Google Chrome 资源管理错误漏洞 CWE-416 8.8AIHighAI2026-04-28
CVE-2026-7358 Google Chrome 资源管理错误漏洞 CWE-416 8.8AIHighAI2026-04-28
CVE-2026-7334 Google Chrome 资源管理错误漏洞 CWE-416 8.8AIHighAI2026-04-28
CVE-2026-7360 Google Chrome 输入验证错误漏洞 CWE-20 6.5AIMediumAI2026-04-28
CVE-2026-7359 Google Chrome 资源管理错误漏洞 CWE-416 9.6AICriticalAI2026-04-28
CVE-2026-7333 Google Chrome 资源管理错误漏洞 CWE-416 9.6AICriticalAI2026-04-28
CVE-2026-7343 Google Chrome 资源管理错误漏洞 CWE-416 9.6AICriticalAI2026-04-28
CVE-2026-7344 Google Chrome 资源管理错误漏洞 CWE-416 9.6AICriticalAI2026-04-28
CVE-2026-7361 Google Chrome 资源管理错误漏洞 CWE-416 8.8AIHighAI2026-04-28
CVE-2026-7363 Google Chrome 资源管理错误漏洞 CWE-416 8.8AIHighAI2026-04-28
CVE-2026-6920 Google Chrome 缓冲区错误漏洞 CWE-125 9.3AICriticalAI2026-04-23
CVE-2026-6921 Google Chrome 竞争条件问题漏洞 CWE-362 7.7AIHighAI2026-04-23
CVE-2026-6919 Google Chrome 资源管理错误漏洞 CWE-416 9.6AICriticalAI2026-04-23
CVE-2026-6319 Google Chrome 安全漏洞 CWE-416 8.8 -2026-04-15

All 2645 known CVE vulnerabilities affecting Chrome with full Chinese analysis, references, and POCs where available.