Description
Inappropriate implementation in Sandbox in Google Chrome prior to 94.0.4606.81 allowed a remote attacker to potentially bypass site isolation via Windows.
Exploits (1)
References (4)
Core 4
Core References
Vendor Advisory x_refsource_misc
https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop.html
Permissions Required, Vendor Advisory x_refsource_misc
https://crbug.com/1254631
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RNARCF5HEZK7GJXZRN5TQ45AQDCRM2WO/
Third Party Advisory vendor-advisory
x_refsource_debian
https://www.debian.org/security/2022/dsa-5046
Scores
CVSS v3
7.4
EPSS
0.0031
EPSS Percentile
54.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
Details
Status
published
Products (4)
debian/debian_linux
10.0
debian/debian_linux
11.0
fedoraproject/fedora
33
google/chrome
< 94.0.4606.81
Published
Nov 02, 2021
Tracked Since
Feb 18, 2026