Skip to content

Commit

Permalink
Show file tree
Hide file tree
Showing 33 changed files with 1,980 additions and 0 deletions.
60 changes: 60 additions & 0 deletions cves/2021/4xxx/CVE-2021-4316.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,60 @@
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2021-4316",
"assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"state": "PUBLISHED",
"assignerShortName": "Chrome",
"dateReserved": "2023-02-12T21:17:50.120Z",
"datePublished": "2023-07-28T23:26:53.101Z",
"dateUpdated": "2023-07-28T23:26:53.101Z"
},
"containers": {
"cna": {
"affected": [
{
"vendor": "Google",
"product": "Chrome",
"versions": [
{
"version": "96.0.4664.45",
"status": "affected",
"lessThan": "96.0.4664.45",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Inappropriate implementation in Cast UI in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to spoof browser UI via a crafted HTML page. (Chromium security severity: Low)"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "Inappropriate implementation"
}
]
}
],
"providerMetadata": {
"orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"shortName": "Chrome",
"dateUpdated": "2023-07-28T23:26:53.101Z"
},
"references": [
{
"url": "https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html"
},
{
"url": "https://crbug.com/1152952"
}
]
}
}
}
60 changes: 60 additions & 0 deletions cves/2021/4xxx/CVE-2021-4317.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,60 @@
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2021-4317",
"assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"state": "PUBLISHED",
"assignerShortName": "Chrome",
"dateReserved": "2023-02-12T21:19:10.486Z",
"datePublished": "2023-07-28T23:26:53.326Z",
"dateUpdated": "2023-07-28T23:26:53.326Z"
},
"containers": {
"cna": {
"affected": [
{
"vendor": "Google",
"product": "Chrome",
"versions": [
{
"version": "96.0.4664.93",
"status": "affected",
"lessThan": "96.0.4664.93",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Use after free in ANGLE in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "Use after free"
}
]
}
],
"providerMetadata": {
"orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"shortName": "Chrome",
"dateUpdated": "2023-07-28T23:26:53.326Z"
},
"references": [
{
"url": "https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html"
},
{
"url": "https://crbug.com/1260783"
}
]
}
}
}
60 changes: 60 additions & 0 deletions cves/2021/4xxx/CVE-2021-4318.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,60 @@
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2021-4318",
"assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"state": "PUBLISHED",
"assignerShortName": "Chrome",
"dateReserved": "2023-02-12T21:19:10.662Z",
"datePublished": "2023-07-28T23:26:53.533Z",
"dateUpdated": "2023-07-28T23:26:53.533Z"
},
"containers": {
"cna": {
"affected": [
{
"vendor": "Google",
"product": "Chrome",
"versions": [
{
"version": "94.0.4606.54",
"status": "affected",
"lessThan": "94.0.4606.54",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Object corruption in Blink in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "Object corruption"
}
]
}
],
"providerMetadata": {
"orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"shortName": "Chrome",
"dateUpdated": "2023-07-28T23:26:53.533Z"
},
"references": [
{
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html"
},
{
"url": "https://crbug.com/1237730"
}
]
}
}
}
60 changes: 60 additions & 0 deletions cves/2021/4xxx/CVE-2021-4319.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,60 @@
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2021-4319",
"assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"state": "PUBLISHED",
"assignerShortName": "Chrome",
"dateReserved": "2023-02-12T21:19:10.824Z",
"datePublished": "2023-07-28T23:26:53.696Z",
"dateUpdated": "2023-07-28T23:26:53.696Z"
},
"containers": {
"cna": {
"affected": [
{
"vendor": "Google",
"product": "Chrome",
"versions": [
{
"version": "93.0.4577.82",
"status": "affected",
"lessThan": "93.0.4577.82",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Use after free in Blink in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "Use after free"
}
]
}
],
"providerMetadata": {
"orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"shortName": "Chrome",
"dateUpdated": "2023-07-28T23:26:53.696Z"
},
"references": [
{
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html"
},
{
"url": "https://crbug.com/1214199"
}
]
}
}
}
60 changes: 60 additions & 0 deletions cves/2021/4xxx/CVE-2021-4320.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,60 @@
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2021-4320",
"assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"state": "PUBLISHED",
"assignerShortName": "Chrome",
"dateReserved": "2023-02-12T21:19:10.948Z",
"datePublished": "2023-07-28T23:26:53.844Z",
"dateUpdated": "2023-07-28T23:26:53.844Z"
},
"containers": {
"cna": {
"affected": [
{
"vendor": "Google",
"product": "Chrome",
"versions": [
{
"version": "92.0.4515.107",
"status": "affected",
"lessThan": "92.0.4515.107",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Use after free in Blink in Google Chrome prior to 92.0.4515.107 allowed a remote attacker who had compromised the renderer process to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "Use after free"
}
]
}
],
"providerMetadata": {
"orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"shortName": "Chrome",
"dateUpdated": "2023-07-28T23:26:53.844Z"
},
"references": [
{
"url": "https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html"
},
{
"url": "https://crbug.com/1224238"
}
]
}
}
}
60 changes: 60 additions & 0 deletions cves/2021/4xxx/CVE-2021-4321.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,60 @@
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2021-4321",
"assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"state": "PUBLISHED",
"assignerShortName": "Chrome",
"dateReserved": "2023-02-12T21:19:11.138Z",
"datePublished": "2023-07-28T23:26:53.981Z",
"dateUpdated": "2023-07-28T23:26:53.981Z"
},
"containers": {
"cna": {
"affected": [
{
"vendor": "Google",
"product": "Chrome",
"versions": [
{
"version": "91.0.4472.77",
"status": "affected",
"lessThan": "91.0.4472.77",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Policy bypass in Blink in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Low)"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "Policy bypass"
}
]
}
],
"providerMetadata": {
"orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"shortName": "Chrome",
"dateUpdated": "2023-07-28T23:26:53.981Z"
},
"references": [
{
"url": "https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop_25.html"
},
{
"url": "https://crbug.com/1161891"
}
]
}
}
}
Loading

0 comments on commit 939ad97

Please sign in to comment.