
Cloud Vulnerability DB
A community-led vulnerabilities database
A heap buffer overflow vulnerability (CVE-2021-21148) was discovered in V8, the JavaScript engine of Google Chrome, affecting versions prior to 88.0.4324.150. The vulnerability was reported by Mattias Buelens on January 24, 2021, and was patched in February 2021. This security flaw affected Chrome browsers across Windows, Mac, and Linux operating systems (Chrome Release).
The vulnerability is classified as a heap buffer overflow in the V8 JavaScript engine that could allow an attacker to potentially exploit heap corruption through a crafted HTML page. The severity of this vulnerability is rated as HIGH with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating its significant impact on system security (NVD).
If successfully exploited, this vulnerability could allow remote attackers to execute arbitrary code via a specially crafted HTML page, potentially leading to system compromise. The high CVSS score indicates that successful exploitation could result in significant impacts to confidentiality, integrity, and availability of the affected system (Threatpost).
Google released version 88.0.4324.150 of Chrome to address this vulnerability. Users are strongly advised to update their Chrome browsers to this version or later. The update was distributed automatically to users, but manual verification of the browser version is recommended. For Linux distributions, specific update packages were released through their respective package managers (Debian Security, Fedora Update).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."