[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-OPENSUSE-SU-2021:1300-1":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-08T08:11:26.341Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":11,"aliases":12,"duplicate_of":9,"upstream":13,"downstream":70,"duplicates":71,"related":72,"reserved_at":9,"published_at":101,"modified_at":102,"state":9,"summary":103,"references_raw":105,"kevs":235,"epss":9,"epss_history":236,"metrics":237,"affected":238},"OPENSUSE-SU-2021:1300-1","Security update for chromium\n\nThis update for chromium fixes the following issues:\n\nChromium 93.0.4577.63 (boo#1190096):\n\n* CVE-2021-30606: Use after free in Blink\n* CVE-2021-30607: Use after free in Permissions\n* CVE-2021-30608: Use after free in Web Share\n* CVE-2021-30609: Use after free in Sign-In\n* CVE-2021-30610: Use after free in Extensions API\n* CVE-2021-30611: Use after free in WebRTC\n* CVE-2021-30612: Use after free in WebRTC\n* CVE-2021-30613: Use after free in Base internals\n* CVE-2021-30614: Heap buffer overflow in TabStrip\n* CVE-2021-30615: Cross-origin data leak in Navigation\n* CVE-2021-30616: Use after free in Media\n* CVE-2021-30617: Policy bypass in Blink\n* CVE-2021-30618: Inappropriate implementation in DevTools\n* CVE-2021-30619: UI Spoofing in Autofill\n* CVE-2021-30620: Insufficient policy enforcement in Blink\n* CVE-2021-30621: UI Spoofing in Autofill\n* CVE-2021-30622: Use after free in WebApp Installs\n* CVE-2021-30623: Use after free in Bookmarks\n* CVE-2021-30624: Use after free in Autofill\n\nChromium 93.0.4577.82 (boo#1190476):\n\n* CVE-2021-30625: Use after free in Selection API\n* CVE-2021-30626: Out of bounds memory access in ANGLE\n* CVE-2021-30627: Type Confusion in Blink layout\n* CVE-2021-30628: Stack buffer overflow in ANGLE\n* CVE-2021-30629: Use after free in Permissions\n* CVE-2021-30630: Inappropriate implementation in Blink\n* CVE-2021-30631: Type Confusion in Blink layout\n* CVE-2021-30632: Out of bounds write in V8\n* CVE-2021-30633: Use after free in Indexed DB API\n",null,[],[],[],[14,16,18,20,22,24,26,28,30,32,34,36,38,40,42,44,46,48,50,52,54,56,58,60,62,64,66,68],{"_key":15},"CVE-2021-30606",{"_key":17},"CVE-2021-30607",{"_key":19},"CVE-2021-30608",{"_key":21},"CVE-2021-30609",{"_key":23},"CVE-2021-30610",{"_key":25},"CVE-2021-30611",{"_key":27},"CVE-2021-30612",{"_key":29},"CVE-2021-30613",{"_key":31},"CVE-2021-30614",{"_key":33},"CVE-2021-30615",{"_key":35},"CVE-2021-30616",{"_key":37},"CVE-2021-30617",{"_key":39},"CVE-2021-30618",{"_key":41},"CVE-2021-30619",{"_key":43},"CVE-2021-30620",{"_key":45},"CVE-2021-30621",{"_key":47},"CVE-2021-30622",{"_key":49},"CVE-2021-30623",{"_key":51},"CVE-2021-30624",{"_key":53},"CVE-2021-30625",{"_key":55},"CVE-2021-30626",{"_key":57},"CVE-2021-30627",{"_key":59},"CVE-2021-30628",{"_key":61},"CVE-2021-30629",{"_key":63},"CVE-2021-30630",{"_key":65},"CVE-2021-30631",{"_key":67},"CVE-2021-30632",{"_key":69},"CVE-2021-30633",[],[],[73,74,75,76,77,78,79,80,81,82,83,84,85,86,87,88,89,90,91,92,93,94,95,96,97,98,99,100],{"_key":15},{"_key":17},{"_key":19},{"_key":21},{"_key":23},{"_key":25},{"_key":27},{"_key":29},{"_key":31},{"_key":33},{"_key":35},{"_key":37},{"_key":39},{"_key":41},{"_key":43},{"_key":45},{"_key":47},{"_key":49},{"_key":51},{"_key":53},{"_key":55},{"_key":57},{"_key":59},{"_key":61},{"_key":63},{"_key":65},{"_key":67},{"_key":69},"2021-09-21T19:26:47Z","2026-02-04T02:13:09.633406Z",{"cisa_kev":104,"cisa_ransomware":104,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":9,"severity_score":9,"severity_version":9,"severity_source":9,"severity_vector":9,"severity_status":9},false,[106,113,118,122,127,131,135,139,143,147,151,155,159,163,167,171,175,179,183,187,191,195,199,203,207,211,215,219,223,227,231],{"url":107,"sources":108,"tags":111},"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AFYTQFVWKBYVVXUN3DISYCDXS27AWFTC/",[109,110],"osv_suse","osv_opensuse",[112],"Advisory",{"url":114,"sources":115,"tags":116},"https://bugzilla.suse.com/1190096",[109,110],[117],"REPORT",{"url":119,"sources":120,"tags":121},"https://bugzilla.suse.com/1190476",[109,110],[117],{"url":123,"sources":124,"tags":125},"https://www.suse.com/security/cve/CVE-2021-30606",[109,110],[126],"WEB",{"url":128,"sources":129,"tags":130},"https://www.suse.com/security/cve/CVE-2021-30607",[109,110],[126],{"url":132,"sources":133,"tags":134},"https://www.suse.com/security/cve/CVE-2021-30608",[109,110],[126],{"url":136,"sources":137,"tags":138},"https://www.suse.com/security/cve/CVE-2021-30609",[109,110],[126],{"url":140,"sources":141,"tags":142},"https://www.suse.com/security/cve/CVE-2021-30610",[109,110],[126],{"url":144,"sources":145,"tags":146},"https://www.suse.com/security/cve/CVE-2021-30611",[109,110],[126],{"url":148,"sources":149,"tags":150},"https://www.suse.com/security/cve/CVE-2021-30612",[109,110],[126],{"url":152,"sources":153,"tags":154},"https://www.suse.com/security/cve/CVE-2021-30613",[109,110],[126],{"url":156,"sources":157,"tags":158},"https://www.suse.com/security/cve/CVE-2021-30614",[109,110],[126],{"url":160,"sources":161,"tags":162},"https://www.suse.com/security/cve/CVE-2021-30615",[109,110],[126],{"url":164,"sources":165,"tags":166},"https://www.suse.com/security/cve/CVE-2021-30616",[109,110],[126],{"url":168,"sources":169,"tags":170},"https://www.suse.com/security/cve/CVE-2021-30617",[109,110],[126],{"url":172,"sources":173,"tags":174},"https://www.suse.com/security/cve/CVE-2021-30618",[109,110],[126],{"url":176,"sources":177,"tags":178},"https://www.suse.com/security/cve/CVE-2021-30619",[109,110],[126],{"url":180,"sources":181,"tags":182},"https://www.suse.com/security/cve/CVE-2021-30620",[109,110],[126],{"url":184,"sources":185,"tags":186},"https://www.suse.com/security/cve/CVE-2021-30621",[109,110],[126],{"url":188,"sources":189,"tags":190},"https://www.suse.com/security/cve/CVE-2021-30622",[109,110],[126],{"url":192,"sources":193,"tags":194},"https://www.suse.com/security/cve/CVE-2021-30623",[109,110],[126],{"url":196,"sources":197,"tags":198},"https://www.suse.com/security/cve/CVE-2021-30624",[109,110],[126],{"url":200,"sources":201,"tags":202},"https://www.suse.com/security/cve/CVE-2021-30625",[109,110],[126],{"url":204,"sources":205,"tags":206},"https://www.suse.com/security/cve/CVE-2021-30626",[109,110],[126],{"url":208,"sources":209,"tags":210},"https://www.suse.com/security/cve/CVE-2021-30627",[109,110],[126],{"url":212,"sources":213,"tags":214},"https://www.suse.com/security/cve/CVE-2021-30628",[109,110],[126],{"url":216,"sources":217,"tags":218},"https://www.suse.com/security/cve/CVE-2021-30629",[109,110],[126],{"url":220,"sources":221,"tags":222},"https://www.suse.com/security/cve/CVE-2021-30630",[109,110],[126],{"url":224,"sources":225,"tags":226},"https://www.suse.com/security/cve/CVE-2021-30631",[109,110],[126],{"url":228,"sources":229,"tags":230},"https://www.suse.com/security/cve/CVE-2021-30632",[109,110],[126],{"url":232,"sources":233,"tags":234},"https://www.suse.com/security/cve/CVE-2021-30633",[109,110],[126],[],[],[],[239,252],{"ecosystem":240,"name":241,"vendor":242,"product":243,"cpe_part":9,"purl_type":244,"purl_namespace":242,"purl_name":243,"source":9,"versions":245},"openSUSE","chromium","opensuse","chromium&distro=openSUSE Leap 15.3","rpm",[246],{"version":247,"is_range":248,"range_type":249,"version_start":9,"version_start_type":9,"version_end":250,"version_end_type":251,"fixed_in":9},"lt93_0_4577_82_bp153_2_28_1",true,"ecosystem","93.0.4577.82-bp153.2.28.1","excluding",{"ecosystem":253,"name":241,"vendor":254,"product":255,"cpe_part":9,"purl_type":244,"purl_namespace":254,"purl_name":255,"source":9,"versions":256},"SUSE Linux Enterprise","suse","chromium&distro=SUSE Package Hub 15 SP3",[257],{"version":247,"is_range":248,"range_type":249,"version_start":9,"version_start_type":9,"version_end":250,"version_end_type":251,"fixed_in":9}]