[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-5276":6},{"stargazers_count":4,"fetched_at":5},6,"2026-05-22T16:08:08.064Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":294,"aliases":295,"duplicate_of":9,"upstream":296,"downstream":297,"duplicates":304,"related":305,"reserved_at":9,"published_at":308,"modified_at":309,"state":310,"summary":311,"references_raw":320,"kevs":333,"epss":334,"epss_history":337,"metrics":495,"affected":502},"CVE-2026-5276","Insufficient policy enforcement in WebUSB in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: High)",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":9,"capec":18},"CWE-693","Protection Mechanism Failure","The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.","weakness","Draft","Pillar",[19,67,71,130,172,176,180,184,188,192,202,206,223,227,238,286,290],{"id":20,"name":21,"techniques":22},"CAPEC-1","Accessing Functionality Not Properly Constrained by ACLs",[23],{"id":24,"name":25,"tactics":26,"countermeasures":42},"T1574.010","Services File Permissions Weakness",[27,30,33,36,39],{"id":28,"name":29},"TA0110","Persistence",{"id":31,"name":32},"TA0111","Privilege Escalation",{"id":34,"name":35},"TA0030","Defense Evasion",{"id":37,"name":38},"TA0005","Stealth",{"id":40,"name":41},"TA0104","Execution",[43,48,52,57,62],{"id":44,"name":45,"tactic":46},"D3-SWI","Software Inventory",{"name":47},"Model",{"id":49,"name":50,"tactic":51},"D3-AVE","Asset Vulnerability Enumeration",{"name":47},{"id":53,"name":54,"tactic":55},"D3-SBV","Service Binary Verification",{"name":56},"Detect",{"id":58,"name":59,"tactic":60},"D3-SU","Software Update",{"name":61},"Harden",{"id":63,"name":64,"tactic":65},"D3-RS","Restore Software",{"name":66},"Restore",{"id":68,"name":69,"techniques":70},"CAPEC-107","Cross Site Tracing",[],{"id":72,"name":73,"techniques":74},"CAPEC-127","Directory Indexing",[75],{"id":76,"name":77,"tactics":78,"countermeasures":82},"T1083","File and Directory Discovery",[79],{"id":80,"name":81},"TA0102","Discovery",[83,87,91,96,101,105,109,114,118,122,126],{"id":84,"name":85,"tactic":86},"D3-FA","File Analysis",{"name":56},{"id":88,"name":89,"tactic":90},"D3-FIM","File Integrity Monitoring",{"name":56},{"id":92,"name":93,"tactic":94},"D3-FEV","File Eviction",{"name":95},"Evict",{"id":97,"name":98,"tactic":99},"D3-DF","Decoy File",{"name":100},"Deceive",{"id":102,"name":103,"tactic":104},"D3-FE","File Encryption",{"name":61},{"id":106,"name":107,"tactic":108},"D3-RF","Restore File",{"name":66},{"id":110,"name":111,"tactic":112},"D3-LFP","Local File Permissions",{"name":113},"Isolate",{"id":115,"name":116,"tactic":117},"D3-CF","Content Filtering",{"name":113},{"id":119,"name":120,"tactic":121},"D3-RFAM","Remote File Access Mediation",{"name":113},{"id":123,"name":124,"tactic":125},"D3-CQ","Content Quarantine",{"name":113},{"id":127,"name":128,"tactic":129},"D3-CM","Content Modification",{"name":113},{"id":131,"name":132,"techniques":133},"CAPEC-17","Using Malicious Files",[134,154],{"id":135,"name":136,"tactics":137,"countermeasures":143},"T1574.005","Executable Installer File Permissions Weakness",[138,139,140,141,142],{"id":28,"name":29},{"id":31,"name":32},{"id":34,"name":35},{"id":37,"name":38},{"id":40,"name":41},[144,146,148,150,152],{"id":44,"name":45,"tactic":145},{"name":47},{"id":49,"name":50,"tactic":147},{"name":47},{"id":53,"name":54,"tactic":149},{"name":56},{"id":58,"name":59,"tactic":151},{"name":61},{"id":63,"name":64,"tactic":153},{"name":66},{"id":24,"name":25,"tactics":155,"countermeasures":161},[156,157,158,159,160],{"id":28,"name":29},{"id":31,"name":32},{"id":34,"name":35},{"id":37,"name":38},{"id":40,"name":41},[162,164,166,168,170],{"id":44,"name":45,"tactic":163},{"name":47},{"id":49,"name":50,"tactic":165},{"name":47},{"id":53,"name":54,"tactic":167},{"name":56},{"id":58,"name":59,"tactic":169},{"name":61},{"id":63,"name":64,"tactic":171},{"name":66},{"id":173,"name":174,"techniques":175},"CAPEC-20","Encryption Brute Forcing",[],{"id":177,"name":178,"techniques":179},"CAPEC-22","Exploiting Trust in Client",[],{"id":181,"name":182,"techniques":183},"CAPEC-237","Escaping a Sandbox by Calling Code in Another Language",[],{"id":185,"name":186,"techniques":187},"CAPEC-36","Using Unpublished Interfaces or Functionality",[],{"id":189,"name":190,"techniques":191},"CAPEC-477","Signature Spoofing by Mixing Signed and Unsigned Content",[],{"id":193,"name":194,"techniques":195},"CAPEC-480","Escaping Virtualization",[196],{"id":197,"name":198,"tactics":199,"countermeasures":201},"T1611","Escape to Host",[200],{"id":31,"name":32},[],{"id":203,"name":204,"techniques":205},"CAPEC-51","Poison Web Service Registry",[],{"id":207,"name":208,"techniques":209},"CAPEC-57","Utilizing REST's Trust in the System Resource to Obtain Sensitive Data",[210],{"id":211,"name":212,"tactics":213,"countermeasures":218},"T1040","Network Sniffing",[214,217],{"id":215,"name":216},"TA0031","Credential Access",{"id":80,"name":81},[219],{"id":220,"name":221,"tactic":222},"D3-DNSTA","DNS Traffic Analysis",{"name":56},{"id":224,"name":225,"techniques":226},"CAPEC-59","Session Credential Falsification through Prediction",[],{"id":228,"name":229,"techniques":230},"CAPEC-65","Sniff Application Code",[231],{"id":211,"name":212,"tactics":232,"countermeasures":235},[233,234],{"id":215,"name":216},{"id":80,"name":81},[236],{"id":220,"name":221,"tactic":237},{"name":56},{"id":239,"name":240,"techniques":241},"CAPEC-668","Key Negotiation of Bluetooth Attack (KNOB)",[242],{"id":243,"name":244,"tactics":245,"countermeasures":249},"T1565.002","Transmitted Data Manipulation",[246],{"id":247,"name":248},"TA0105","Impact",[250,254,258,262,266,270,274,278,282],{"id":251,"name":252,"tactic":253},"D3-UGLPA","User Geolocation Logon Pattern Analysis",{"name":56},{"id":255,"name":256,"tactic":257},"D3-PMAD","Protocol Metadata Anomaly Detection",{"name":56},{"id":259,"name":260,"tactic":261},"D3-CSPP","Client-server Payload Profiling",{"name":56},{"id":263,"name":264,"tactic":265},"D3-PHDURA","Per Host Download-Upload Ratio Analysis",{"name":56},{"id":267,"name":268,"tactic":269},"D3-NTSA","Network Traffic Signature Analysis",{"name":56},{"id":271,"name":272,"tactic":273},"D3-APCA","Application Protocol Command Analysis",{"name":56},{"id":275,"name":276,"tactic":277},"D3-NTCD","Network Traffic Community Deviation",{"name":56},{"id":279,"name":280,"tactic":281},"D3-RTSD","Remote Terminal Session Detection",{"name":56},{"id":283,"name":284,"tactic":285},"D3-NTF","Network Traffic Filtering",{"name":113},{"id":287,"name":288,"techniques":289},"CAPEC-74","Manipulating State",[],{"id":291,"name":292,"techniques":293},"CAPEC-87","Forceful Browsing",[],[],[],[],[298,300,302],{"_key":299},"OPENSUSE-SU-2026:20460-1",{"_key":301},"OPENSUSE-SU-2026:10487-1",{"_key":303},"DEBIAN-CVE-2026-5276",[],[306,307],{"_key":299},{"_key":301},"2026-04-01T04:41:31.055Z","2026-04-01T13:33:18.780Z","Analyzed",{"cisa_kev":312,"cisa_ransomware":312,"cisa_vendor":9,"epss_severity":313,"epss_score":314,"severity":315,"severity_score":316,"severity_version":317,"severity_source":318,"severity_vector":319,"severity_status":310},false,"low",0.00063,"medium",6.5,"v3.1","cve.org","CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",[321,327],{"url":322,"sources":323,"tags":325},"https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html",[318,324],"nvd",[326],"Vendor Advisory",{"url":328,"sources":329,"tags":330},"https://issues.chromium.org/issues/489711638",[318,324],[331,332],"Issue Tracking","Permissions Required",[],{"date":335,"score":314,"percentile":336},"2026-05-22",0.19558,[338,342,346,349,352,355,358,362,365,368,371,374,377,380,383,386,389,392,395,398,401,404,407,410,413,416,419,422,424,427,430,433,436,440,443,446,449,452,455,458,461,464,467,470,473,476,479,482,485,488,491,494],{"date":339,"score":340,"percentile":341},"2026-04-01",0.00032,0.09271,{"date":343,"score":344,"percentile":345},"2026-04-02",0.00042,0.12733,{"date":347,"score":344,"percentile":348},"2026-04-03",0.12746,{"date":350,"score":344,"percentile":351},"2026-04-04",0.12779,{"date":353,"score":344,"percentile":354},"2026-04-05",0.12761,{"date":356,"score":344,"percentile":357},"2026-04-06",0.12596,{"date":359,"score":360,"percentile":361},"2026-04-07",0.00045,0.13761,{"date":363,"score":360,"percentile":364},"2026-04-08",0.13843,{"date":366,"score":360,"percentile":367},"2026-04-09",0.13893,{"date":369,"score":360,"percentile":370},"2026-04-10",0.13881,{"date":372,"score":360,"percentile":373},"2026-04-11",0.13851,{"date":375,"score":360,"percentile":376},"2026-04-12",0.13815,{"date":378,"score":360,"percentile":379},"2026-04-13",0.13766,{"date":381,"score":360,"percentile":382},"2026-04-14",0.13641,{"date":384,"score":360,"percentile":385},"2026-04-15",0.13678,{"date":387,"score":360,"percentile":388},"2026-04-16",0.13676,{"date":390,"score":360,"percentile":391},"2026-04-17",0.13668,{"date":393,"score":360,"percentile":394},"2026-04-18",0.1367,{"date":396,"score":360,"percentile":397},"2026-04-19",0.1363,{"date":399,"score":360,"percentile":400},"2026-04-20",0.13593,{"date":402,"score":360,"percentile":403},"2026-04-21",0.13741,{"date":405,"score":360,"percentile":406},"2026-04-22",0.13801,{"date":408,"score":360,"percentile":409},"2026-04-23",0.13811,{"date":411,"score":360,"percentile":412},"2026-04-24",0.13763,{"date":414,"score":360,"percentile":415},"2026-04-25",0.13757,{"date":417,"score":360,"percentile":418},"2026-04-26",0.13731,{"date":420,"score":360,"percentile":421},"2026-04-27",0.13713,{"date":423,"score":360,"percentile":391},"2026-04-28",{"date":425,"score":360,"percentile":426},"2026-04-29",0.13647,{"date":428,"score":360,"percentile":429},"2026-04-30",0.13624,{"date":431,"score":360,"percentile":432},"2026-05-01",0.13596,{"date":434,"score":360,"percentile":435},"2026-05-02",0.13623,{"date":437,"score":438,"percentile":439},"2026-05-03",0.00049,0.15052,{"date":441,"score":438,"percentile":442},"2026-05-04",0.14987,{"date":444,"score":438,"percentile":445},"2026-05-05",0.14982,{"date":447,"score":438,"percentile":448},"2026-05-06",0.14979,{"date":450,"score":438,"percentile":451},"2026-05-07",0.15108,{"date":453,"score":438,"percentile":454},"2026-05-08",0.15144,{"date":456,"score":438,"percentile":457},"2026-05-09",0.15201,{"date":459,"score":438,"percentile":460},"2026-05-10",0.15203,{"date":462,"score":438,"percentile":463},"2026-05-11",0.15184,{"date":465,"score":438,"percentile":466},"2026-05-12",0.15227,{"date":468,"score":438,"percentile":469},"2026-05-13",0.15249,{"date":471,"score":438,"percentile":472},"2026-05-14",0.15304,{"date":474,"score":438,"percentile":475},"2026-05-15",0.15316,{"date":477,"score":438,"percentile":478},"2026-05-16",0.15339,{"date":480,"score":438,"percentile":481},"2026-05-17",0.15313,{"date":483,"score":438,"percentile":484},"2026-05-18",0.15262,{"date":486,"score":438,"percentile":487},"2026-05-19",0.15242,{"date":489,"score":438,"percentile":490},"2026-05-20",0.15255,{"date":492,"score":438,"percentile":493},"2026-05-21",0.1524,{"date":335,"score":314,"percentile":336},[496,500],{"source":318,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":497,"cvss_v4_0":9},{"baseScore":316,"baseSeverity":498,"vectorString":319,"impactScore":4,"exploitabilityScore":499},"MEDIUM",7.2,{"source":324,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":501,"cvss_v4_0":9},{"baseScore":316,"baseSeverity":498,"vectorString":319,"impactScore":4,"exploitabilityScore":499},[503],{"ecosystem":9,"name":504,"vendor":9,"product":504,"cpe_part":9,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":505},"Chrome",[506,512],{"version":507,"is_range":508,"range_type":318,"version_start":509,"version_start_type":510,"version_end":509,"version_end_type":511,"fixed_in":9},">= 146.0.7680.178, \u003C 146.0.7680.178",true,"146.0.7680.178","including","excluding",{"version":513,"is_range":508,"range_type":514,"version_start":9,"version_start_type":9,"version_end":515,"version_end_type":511,"fixed_in":9},"lt146.0.7680.177","cpe","146.0.7680.177"]