CVE-2021-38003

ENISA EUVD: EUVD-2021-24476 ↗
Exploited in the Wild ✓ Confirmed 0-Day ★ Google Project Zero
Triaged: March 5, 2026 6 articles Published: 2021-11-23

EPSS Score

Source: FIRST.org · 2026-05-23
65.7%
probability
This CVE has a 65.7% probability of being exploited in the next 30 days.
0% Top 98.5th percentile of all CVEs 100%

CVSS v3.1

Source: VulnerabilityLookup (CIRCL)
8.8
HIGH
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVSS v2 (legacy)

6.8
MEDIUM
Access Vector
Network
Access Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
AV:N/AC:M/Au:N/C:P/I:P/A:P

Description

VulnerabilityLookup (CNA)
Inappropriate implementation in V8 in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Affected Products

Google
Chrome
unspecified

Google Project Zero

Discovered
Oct. 26, 2021
Patched
Oct. 28, 2021
Reported by
Clément Lecigne from Google TAG and Samuel Groß from Google Project Zero
Root Cause Analysis
???

Exploits & PoC

SpiralBL0CK/Chrome-V8-RCE-CVE-2021-38003

CVE-2021-38003 exploits extracted from https://twitter.com/WhichbufferArda/status/1609604183535284224

37 2023-01-07
1 repo — triés par ⭐ Rechercher sur GitHub ↗

Signal Intelligence

Confidence
95%
EPSS 65.7%
CVSS v3.1 8.8
Mentions 6
Last Seen May 22, 2022

CNA Information

CNA Assigner
Chrome

Analyst Note

Auto-imported from Google Project Zero — confirmed zero-day by definition.

Threat Actors 1

PassCV
apt_group Information theft and espionage 🇨🇳 CN

Triage Info

Decided atMar 05, 2026
Published DateNov 23, 2021