### [CVE-2021-30528](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30528) ![](https://img.shields.io/static/v1?label=Product&message=Chrome&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=unspecified%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Use%20after%20free&color=brightgreen) ### Description Use after free in WebAuthentication in Google Chrome on Android prior to 91.0.4472.77 allowed a remote attacker who had compromised the renderer process of a user who had saved a credit card in their Google account to potentially exploit heap corruption via a crafted HTML page. ### POC #### Reference - http://packetstormsecurity.com/files/172844/Chrome-Sandbox-Escape.html #### Github - https://github.com/gmh5225/vulnjs - https://github.com/n0-traces/cve_monitor - https://github.com/wh1ant/vulnjs