6.8
CVSSv2

CVE-2021-30551

Published: 15/06/2021 Updated: 07/11/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 606
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Type confusion in V8 in Google Chrome before 91.0.4472.101 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

google chrome

fedoraproject fedora 33

fedoraproject fedora 34

Vendor Advisories

A type confusion security issue has been found in the V8 component of the Chromium browser before version 9104472101 Google is aware that an exploit for CVE-2021-30551 exists in the wild ...
The Stable channel has been updated to 9104472101 for Windows, Mac and Linux which will roll out over the coming days/weeksA full list of changes in this build is available in the log Interested in switching release channels?  Find out how here If you find a new issue, please let us know by filing a bug The community help forum is also ...

Github Repositories

IIntroduction During the STHACK 2022 (CTF event @Bordeaux France), Laluka has created few web challenges including the Headless Updateless Brainless challenge that had a "pwn" exploitation step To be honest, this challenge was not resolved by our team during the CTF Got stuck at the last final exploitation step After chatting with Laluka, he agreed to give us an ac

my exp for chrome V8 CVE-2021-30551

CVE-2021-30551 My exp for chrome V8 CVE-2021-30551 You can found your chrome version by chrome://version or go to whatsmyuseragentorg/ You can set up a webserver locally using python like: python3 -m httpserver 8080 And the test it by accessing 127001:8080

Recent Articles

Microsoft, Google, Citizen Lab blow lid off zero-day bug-exploiting spyware sold to governments
The Register • Iain Thomson in San Francisco • 16 Jul 2021

100+ dissidents, politicians, journos targeted by Israeli espionage toolkit

Analysis Software patches from Microsoft this week closed two vulnerabilities exploited by spyware said to have been sold to governments by Israeli developer Candiru. On Thursday, Citizen Lab released a report fingering Candiru as the maker of the espionage toolkit, an outfit Microsoft code-named Sourgum. It is understood the spyware, code-named DevilsTongue by Microsoft, exploited at least a pair of zero-day holes in Windows to infect particular targets' machines. Redmond said at least 100 peop...