{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreic3lbjitut64n2ltmwskabcyxnohwprc5uvssau6m4nf5c2akwz7y",
"uri": "at://did:plc:6wtxqaikjf62unmnajbfbq5v/app.bsky.feed.post/3mfg62a63w5l2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreibognacncmvd4nhb3ob5lun5cszol5nuzxgkp6ojvlq5a4mtoigf4"
},
"mimeType": "image/webp",
"size": 19298
},
"path": "/poc-released-for-critical-chrome-cve-2026-2441-zero-day-exploited-in-the-wild/",
"publishedAt": "2026-02-21T18:35:22.000Z",
"site": "https://vpncentral.com",
"tags": [
"News",
"PoC Released for Critical Chrome CVE-2026-2441 Zero-Day Exploited in the Wild",
"VPN Central"
],
"textContent": "A public proof-of-concept exploit targets CVE-2026-2441, a critical use-after-free zero-day in Chrome’s Blink CSS engine. Google confirms active in-the-wild exploitation. Security researcher Shaheen Fazim reported it on February 11, 2026. Google patched two days later in emergency versions. The flaw lives in CSSFontFeatureValuesMap. An iterator holds a raw pointer to FontFeatureAliases HashMap. Mutations during iteration […]\n\nThe post PoC Released for Critical Chrome CVE-2026-2441 Zero-Day Exploited in the Wild appeared first on VPN Central.",
"title": "PoC Released for Critical Chrome CVE-2026-2441 Zero-Day Exploited in the Wild"
}