{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-30528","assignerOrgId":"ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28","assignerShortName":"Chrome","dateUpdated":"2024-08-03T22:32:41.130Z","dateReserved":"2021-04-13T00:00:00.000Z","datePublished":"2021-06-07T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28","shortName":"Chrome","dateUpdated":"2023-06-12T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"Use after free in WebAuthentication in Google Chrome on Android prior to 91.0.4472.77 allowed a remote attacker who had compromised the renderer process of a user who had saved a credit card in their Google account to potentially exploit heap corruption via a crafted HTML page."}],"affected":[{"vendor":"Google","product":"Chrome","versions":[{"version":"unspecified","lessThan":"91.0.4472.77","status":"affected","versionType":"custom"}]}],"references":[{"url":"https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop_25.html"},{"url":"https://crbug.com/1206329"},{"name":"GLSA-202107-06","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/202107-06"},{"name":"FEDORA-2021-f94dadff78","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54/"},{"name":"FEDORA-2021-ca58c57bdf","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43/"},{"url":"http://packetstormsecurity.com/files/172844/Chrome-Sandbox-Escape.html"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"Use after free"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T22:32:41.130Z"},"title":"CVE Program Container","references":[{"url":"https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop_25.html","tags":["x_transferred"]},{"url":"https://crbug.com/1206329","tags":["x_transferred"]},{"name":"GLSA-202107-06","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/202107-06"},{"name":"FEDORA-2021-f94dadff78","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54/"},{"name":"FEDORA-2021-ca58c57bdf","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43/"},{"url":"http://packetstormsecurity.com/files/172844/Chrome-Sandbox-Escape.html","tags":["x_transferred"]}]}]}}