[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-OPENSUSE-SU-2021:1462-1":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-08T03:11:47.468Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":11,"aliases":12,"duplicate_of":9,"upstream":13,"downstream":28,"duplicates":29,"related":30,"reserved_at":9,"published_at":38,"modified_at":39,"state":9,"summary":40,"references_raw":42,"kevs":84,"epss":9,"epss_history":85,"metrics":86,"affected":87},"OPENSUSE-SU-2021:1462-1","Security update for chromium\n\nThis update for chromium fixes the following issues:\n\nChromium 95.0.4638.69 (boo#1192184):\n\n* CVE-2021-37997: Use after free in Sign-In\n* CVE-2021-37998: Use after free in Garbage Collection\n* CVE-2021-37999: Insufficient data validation in New Tab Page\n* CVE-2021-38000: Insufficient validation of untrusted input in Intents\n* CVE-2021-38001: Type Confusion in V8\n* CVE-2021-38002: Use after free in Web Transport\n* CVE-2021-38003: Inappropriate implementation in V8\n",null,[],[],[],[14,16,18,20,22,24,26],{"_key":15},"CVE-2021-37997",{"_key":17},"CVE-2021-37998",{"_key":19},"CVE-2021-37999",{"_key":21},"CVE-2021-38000",{"_key":23},"CVE-2021-38001",{"_key":25},"CVE-2021-38002",{"_key":27},"CVE-2021-38003",[],[],[31,32,33,34,35,36,37],{"_key":15},{"_key":17},{"_key":19},{"_key":21},{"_key":23},{"_key":25},{"_key":27},"2021-11-08T14:24:30Z","2026-02-04T02:33:15.609124Z",{"cisa_kev":41,"cisa_ransomware":41,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":9,"severity_score":9,"severity_version":9,"severity_source":9,"severity_vector":9,"severity_status":9},false,[43,50,55,60,64,68,72,76,80],{"url":44,"sources":45,"tags":48},"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LILU2Q77SAPFWPTS2P4ZOLY6WZ3NJCJN/",[46,47],"osv_suse","osv_opensuse",[49],"Advisory",{"url":51,"sources":52,"tags":53},"https://bugzilla.suse.com/1192184",[46,47],[54],"REPORT",{"url":56,"sources":57,"tags":58},"https://www.suse.com/security/cve/CVE-2021-37997",[46,47],[59],"WEB",{"url":61,"sources":62,"tags":63},"https://www.suse.com/security/cve/CVE-2021-37998",[46,47],[59],{"url":65,"sources":66,"tags":67},"https://www.suse.com/security/cve/CVE-2021-37999",[46,47],[59],{"url":69,"sources":70,"tags":71},"https://www.suse.com/security/cve/CVE-2021-38000",[46,47],[59],{"url":73,"sources":74,"tags":75},"https://www.suse.com/security/cve/CVE-2021-38001",[46,47],[59],{"url":77,"sources":78,"tags":79},"https://www.suse.com/security/cve/CVE-2021-38002",[46,47],[59],{"url":81,"sources":82,"tags":83},"https://www.suse.com/security/cve/CVE-2021-38003",[46,47],[59],[],[],[],[88,101,105],{"ecosystem":89,"name":90,"vendor":91,"product":92,"cpe_part":9,"purl_type":93,"purl_namespace":91,"purl_name":92,"source":9,"versions":94},"openSUSE","chromium","opensuse","chromium&distro=openSUSE Leap 15.2","rpm",[95],{"version":96,"is_range":97,"range_type":98,"version_start":9,"version_start_type":9,"version_end":99,"version_end_type":100,"fixed_in":9},"lt95_0_4638_69_bp153_2_40_3",true,"ecosystem","95.0.4638.69-bp153.2.40.3","excluding",{"ecosystem":89,"name":90,"vendor":91,"product":102,"cpe_part":9,"purl_type":93,"purl_namespace":91,"purl_name":102,"source":9,"versions":103},"chromium&distro=openSUSE Leap 15.3",[104],{"version":96,"is_range":97,"range_type":98,"version_start":9,"version_start_type":9,"version_end":99,"version_end_type":100,"fixed_in":9},{"ecosystem":106,"name":90,"vendor":107,"product":108,"cpe_part":9,"purl_type":93,"purl_namespace":107,"purl_name":108,"source":9,"versions":109},"SUSE Linux Enterprise","suse","chromium&distro=SUSE Package Hub 15 SP3",[110],{"version":96,"is_range":97,"range_type":98,"version_start":9,"version_start_type":9,"version_end":99,"version_end_type":100,"fixed_in":9}]