CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:P/I:P/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
92.0%
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, bypass security restrictions, spoof user interface, obtain sensitive information.
Below is a complete list of vulnerabilities:
Stable Channel Update for Desktop
CVE-2020-27844 unknown
CVE-2021-21159 unknown
CVE-2021-21160 unknown
CVE-2021-21161 unknown
CVE-2021-21162 unknown
CVE-2021-21163 unknown
CVE-2021-21164 unknown
CVE-2021-21165 unknown
CVE-2021-21166 unknown
CVE-2021-21167 unknown
CVE-2021-21168 unknown
CVE-2021-21169 unknown
CVE-2021-21170 unknown
CVE-2021-21171 unknown
CVE-2021-21172 unknown
CVE-2021-21173 unknown
CVE-2021-21174 unknown
CVE-2021-21175 unknown
CVE-2021-21176 unknown
CVE-2021-21177 unknown
CVE-2021-21178 unknown
CVE-2021-21179 unknown
CVE-2021-21180 unknown
CVE-2021-21181 unknown
CVE-2021-21182 unknown
CVE-2021-21183 unknown
CVE-2021-21184 unknown
CVE-2021-21185 unknown
CVE-2021-21186 unknown
CVE-2021-21187 unknown
CVE-2021-21188 unknown
CVE-2021-21189 unknown
CVE-2021-21190 unknown
CVE-2021-21200 unknown
Update to the latest version
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:P/I:P/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
92.0%