Search for vulnerabilities
Vulnerability details: VCID-3k5c-25p3-4udh
Vulnerability ID VCID-3k5c-25p3-4udh
Aliases CVE-2021-21209
Summary Inappropriate implementation in storage in Google Chrome prior to 90.0.4430.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.00743 https://api.first.org/data/v1/epss?cve=CVE-2021-21209
epss 0.00743 https://api.first.org/data/v1/epss?cve=CVE-2021-21209
epss 0.00743 https://api.first.org/data/v1/epss?cve=CVE-2021-21209
epss 0.00743 https://api.first.org/data/v1/epss?cve=CVE-2021-21209
epss 0.00743 https://api.first.org/data/v1/epss?cve=CVE-2021-21209
epss 0.00743 https://api.first.org/data/v1/epss?cve=CVE-2021-21209
epss 0.00743 https://api.first.org/data/v1/epss?cve=CVE-2021-21209
epss 0.00743 https://api.first.org/data/v1/epss?cve=CVE-2021-21209
epss 0.00743 https://api.first.org/data/v1/epss?cve=CVE-2021-21209
epss 0.00743 https://api.first.org/data/v1/epss?cve=CVE-2021-21209
epss 0.00743 https://api.first.org/data/v1/epss?cve=CVE-2021-21209
epss 0.00743 https://api.first.org/data/v1/epss?cve=CVE-2021-21209
epss 0.00743 https://api.first.org/data/v1/epss?cve=CVE-2021-21209
epss 0.00743 https://api.first.org/data/v1/epss?cve=CVE-2021-21209
epss 0.00743 https://api.first.org/data/v1/epss?cve=CVE-2021-21209
epss 0.00743 https://api.first.org/data/v1/epss?cve=CVE-2021-21209
epss 0.00743 https://api.first.org/data/v1/epss?cve=CVE-2021-21209
epss 0.00743 https://api.first.org/data/v1/epss?cve=CVE-2021-21209
epss 0.00743 https://api.first.org/data/v1/epss?cve=CVE-2021-21209
epss 0.00743 https://api.first.org/data/v1/epss?cve=CVE-2021-21209
epss 0.00743 https://api.first.org/data/v1/epss?cve=CVE-2021-21209
epss 0.00743 https://api.first.org/data/v1/epss?cve=CVE-2021-21209
epss 0.00743 https://api.first.org/data/v1/epss?cve=CVE-2021-21209
epss 0.00743 https://api.first.org/data/v1/epss?cve=CVE-2021-21209
epss 0.00743 https://api.first.org/data/v1/epss?cve=CVE-2021-21209
epss 0.00743 https://api.first.org/data/v1/epss?cve=CVE-2021-21209
epss 0.00743 https://api.first.org/data/v1/epss?cve=CVE-2021-21209
epss 0.00743 https://api.first.org/data/v1/epss?cve=CVE-2021-21209
epss 0.00743 https://api.first.org/data/v1/epss?cve=CVE-2021-21209
cvssv2 4.3 https://nvd.nist.gov/vuln/detail/CVE-2021-21209
cvssv3.1 6.5 https://nvd.nist.gov/vuln/detail/CVE-2021-21209
archlinux High https://security.archlinux.org/AVG-1827
archlinux High https://security.archlinux.org/AVG-1828
Reference id Reference type URL
https://api.first.org/data/v1/epss?cve=CVE-2021-21209
https://crbug.com/1143526
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21201
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21202
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21205
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21207
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21209
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21210
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21211
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21213
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21214
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21215
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21216
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21221
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21223
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21224
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21225
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4323
987053 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987053
ASA-202104-2 https://security.archlinux.org/ASA-202104-2
AVG-1827 https://security.archlinux.org/AVG-1827
AVG-1828 https://security.archlinux.org/AVG-1828
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
CVE-2021-21209 https://nvd.nist.gov/vuln/detail/CVE-2021-21209
No exploits are available.
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2021-21209
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2021-21209
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.72039
EPSS Score 0.00743
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:41:42.308570+00:00 Alpine Linux Importer Import https://secdb.alpinelinux.org/edge/community.json 37.0.0