{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreic3lbjitut64n2ltmwskabcyxnohwprc5uvssau6m4nf5c2akwz7y",
    "uri": "at://did:plc:6wtxqaikjf62unmnajbfbq5v/app.bsky.feed.post/3mfg62a63w5l2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreibognacncmvd4nhb3ob5lun5cszol5nuzxgkp6ojvlq5a4mtoigf4"
    },
    "mimeType": "image/webp",
    "size": 19298
  },
  "path": "/poc-released-for-critical-chrome-cve-2026-2441-zero-day-exploited-in-the-wild/",
  "publishedAt": "2026-02-21T18:35:22.000Z",
  "site": "https://vpncentral.com",
  "tags": [
    "News",
    "PoC Released for Critical Chrome CVE-2026-2441 Zero-Day Exploited in the Wild",
    "VPN Central"
  ],
  "textContent": "A public proof-of-concept exploit targets CVE-2026-2441, a critical use-after-free zero-day in Chrome’s Blink CSS engine. Google confirms active in-the-wild exploitation. Security researcher Shaheen Fazim reported it on February 11, 2026. Google patched two days later in emergency versions. The flaw lives in CSSFontFeatureValuesMap. An iterator holds a raw pointer to FontFeatureAliases HashMap. Mutations during iteration […]\n\nThe post PoC Released for Critical Chrome CVE-2026-2441 Zero-Day Exploited in the Wild appeared first on VPN Central.",
  "title": "PoC Released for Critical Chrome CVE-2026-2441 Zero-Day Exploited in the Wild"
}