Search for vulnerabilities
Vulnerability details: VCID-fbtc-dmfn-aaam
Vulnerability ID VCID-fbtc-dmfn-aaam
Aliases CVE-2021-21223
Summary Integer overflow in Mojo in Google Chrome prior to 90.0.4430.85 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
Status Published
Exploitability 0.5
Weighted Severity 8.6
Risk 4.3
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-21223.html
epss 0.00373 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.00373 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.00373 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.00373 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.00373 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.00373 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.00373 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.00373 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.00373 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.00373 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.00373 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.00373 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.00373 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.00373 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.00373 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.00373 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.00373 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.00373 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.00373 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.00373 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.00373 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.00373 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.00373 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.00373 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.00373 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.00373 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.00373 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.00373 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01320 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01320 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01320 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01320 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01320 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01320 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01320 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01320 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01320 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01320 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01320 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01796 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01796 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01796 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.01796 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.02113 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.02113 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.02113 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.02113 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.02113 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.02113 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.02113 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.02113 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.02113 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.02113 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.02113 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.02113 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
epss 0.06107 https://api.first.org/data/v1/epss?cve=CVE-2021-21223
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21201
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21202
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21203
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21204
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21205
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21207
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21208
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21209
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21210
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21211
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21212
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21213
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21214
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21215
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21216
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21217
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21218
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21219
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21221
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21222
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21223
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21224
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21225
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21226
cvssv2 6.8 https://nvd.nist.gov/vuln/detail/CVE-2021-21223
cvssv3 9.6 https://nvd.nist.gov/vuln/detail/CVE-2021-21223
cvssv3.1 9.6 https://nvd.nist.gov/vuln/detail/CVE-2021-21223
archlinux High https://security.archlinux.org/AVG-1828
archlinux High https://security.archlinux.org/AVG-1840
archlinux High https://security.archlinux.org/AVG-1843
Reference id Reference type URL
http://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-21223.html
https://api.first.org/data/v1/epss?cve=CVE-2021-21223
https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_20.html
https://crbug.com/1195308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21201
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21202
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21205
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21207
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21209
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21210
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21211
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21213
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21214
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21215
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21216
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21221
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21223
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21224
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21225
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4323
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EAJ42L4JFPBJATCZ7MOZQTUDGV4OEHHG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3GZ42MYPGD35V652ZPVPYYS7A7LVXVY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUZBGKGVZADNA3I24NVG7HAYYUTOSN5A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EAJ42L4JFPBJATCZ7MOZQTUDGV4OEHHG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3GZ42MYPGD35V652ZPVPYYS7A7LVXVY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VUZBGKGVZADNA3I24NVG7HAYYUTOSN5A/
https://security.gentoo.org/glsa/202104-08
https://www.debian.org/security/2021/dsa-4906
987358 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987358
ASA-202104-2 https://security.archlinux.org/ASA-202104-2
ASA-202104-5 https://security.archlinux.org/ASA-202104-5
ASA-202104-7 https://security.archlinux.org/ASA-202104-7
AVG-1828 https://security.archlinux.org/AVG-1828
AVG-1840 https://security.archlinux.org/AVG-1840
AVG-1843 https://security.archlinux.org/AVG-1843
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
CVE-2021-21223 https://nvd.nist.gov/vuln/detail/CVE-2021-21223
No exploits are available.
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2021-21223
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2021-21223
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2021-21223
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.56238
EPSS Score 0.00373
Published At April 13, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.