{"id":"CVE-2026-3924","details":"use after free in WindowDialog in Google Chrome prior to 146.0.7680.71 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)","modified":"2026-03-23T05:12:40.739084647Z","published":"2026-03-11T22:16:34.987Z","related":["CGA-qvxq-9vf5-xp3p","openSUSE-SU-2026:10376-1","openSUSE-SU-2026:20372-1"],"references":[{"type":"ADVISORY","url":"https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_10.html"},{"type":"REPORT","url":"https://issues.chromium.org/issues/487338366"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-3924.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"146.0.7680.71"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}