Search for vulnerabilities
Vulnerability details: VCID-re9x-guug-pbed
Vulnerability ID VCID-re9x-guug-pbed
Aliases CVE-2021-21144
Summary Heap buffer overflow in Tab Groups in Google Chrome prior to 88.0.4324.146 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.0032 https://api.first.org/data/v1/epss?cve=CVE-2021-21144
epss 0.0032 https://api.first.org/data/v1/epss?cve=CVE-2021-21144
epss 0.0032 https://api.first.org/data/v1/epss?cve=CVE-2021-21144
epss 0.0032 https://api.first.org/data/v1/epss?cve=CVE-2021-21144
epss 0.0032 https://api.first.org/data/v1/epss?cve=CVE-2021-21144
epss 0.0032 https://api.first.org/data/v1/epss?cve=CVE-2021-21144
epss 0.0032 https://api.first.org/data/v1/epss?cve=CVE-2021-21144
epss 0.0032 https://api.first.org/data/v1/epss?cve=CVE-2021-21144
epss 0.0032 https://api.first.org/data/v1/epss?cve=CVE-2021-21144
epss 0.0032 https://api.first.org/data/v1/epss?cve=CVE-2021-21144
epss 0.0032 https://api.first.org/data/v1/epss?cve=CVE-2021-21144
epss 0.0032 https://api.first.org/data/v1/epss?cve=CVE-2021-21144
epss 0.0032 https://api.first.org/data/v1/epss?cve=CVE-2021-21144
epss 0.0032 https://api.first.org/data/v1/epss?cve=CVE-2021-21144
epss 0.0032 https://api.first.org/data/v1/epss?cve=CVE-2021-21144
epss 0.0032 https://api.first.org/data/v1/epss?cve=CVE-2021-21144
epss 0.0032 https://api.first.org/data/v1/epss?cve=CVE-2021-21144
epss 0.0032 https://api.first.org/data/v1/epss?cve=CVE-2021-21144
epss 0.0032 https://api.first.org/data/v1/epss?cve=CVE-2021-21144
epss 0.0032 https://api.first.org/data/v1/epss?cve=CVE-2021-21144
epss 0.0032 https://api.first.org/data/v1/epss?cve=CVE-2021-21144
epss 0.0032 https://api.first.org/data/v1/epss?cve=CVE-2021-21144
epss 0.0032 https://api.first.org/data/v1/epss?cve=CVE-2021-21144
epss 0.0032 https://api.first.org/data/v1/epss?cve=CVE-2021-21144
epss 0.0032 https://api.first.org/data/v1/epss?cve=CVE-2021-21144
epss 0.0032 https://api.first.org/data/v1/epss?cve=CVE-2021-21144
cvssv2 6.8 https://nvd.nist.gov/vuln/detail/CVE-2021-21144
cvssv3.1 8.8 https://nvd.nist.gov/vuln/detail/CVE-2021-21144
archlinux Critical https://security.archlinux.org/AVG-1478
archlinux Critical https://security.archlinux.org/AVG-1525
Reference id Reference type URL
https://api.first.org/data/v1/epss?cve=CVE-2021-21144
https://chromereleases.googleblog.com/2021/02/stable-channel-update-for-desktop.html
https://crbug.com/1163845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16044
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21117
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21120
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21122
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21123
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21127
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21130
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21132
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21134
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21136
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21138
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21140
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21141
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21142
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21143
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21145
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21147
ASA-202102-4 https://security.archlinux.org/ASA-202102-4
ASA-202102-6 https://security.archlinux.org/ASA-202102-6
AVG-1478 https://security.archlinux.org/AVG-1478
AVG-1525 https://security.archlinux.org/AVG-1525
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
CVE-2021-21144 https://nvd.nist.gov/vuln/detail/CVE-2021-21144
No exploits are available.
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2021-21144
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2021-21144
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.54464
EPSS Score 0.0032
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T10:15:30.751007+00:00 NVD Importer Import https://nvd.nist.gov/vuln/detail/CVE-2021-21144 37.0.0