CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,847 CVEs tracked 53,242 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,918 Nuclei templates 37,802 vendors 42,493 researchers
6,619 results Clear all
CVE-2026-3979 5.3 MEDIUM
quickjs-ng quickjs <=0.12.1 - Use After Free
A flaw has been found in quickjs-ng quickjs up to 0.12.1. This affects the function js_iterator_concat_return of the file quickjs.c. This manipulation causes use after free. The attack requires local access. The exploit has been published and may be used. Patch name: daab4ad4bae4ef071ed0294618d6244e92def4cd. Applying a patch is the recommended action to fix this issue.
CWE-119 Mar 12, 2026
CVE-2026-3936
Google Chrome Android <146.0.7680.71 - Use After Free
Use after free in WebView in Google Chrome on Android prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
CWE-416 Mar 11, 2026
CVE-2026-3924
Google Chrome <146.0.7680.71 - Use After Free
use after free in WindowDialog in Google Chrome prior to 146.0.7680.71 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
CWE-416 Mar 11, 2026
CVE-2026-3923
Google Chrome <146.0.7680.71 - Use After Free
Use after free in WebMIDI in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE-416 Mar 11, 2026
CVE-2026-3922
Google Chrome <146.0.7680.71 - Use After Free
Use after free in MediaStream in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE-416 Mar 11, 2026
CVE-2026-3921
Google Chrome <146.0.7680.71 - Use After Free
Use after free in TextEncoding in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE-416 Mar 11, 2026
CVE-2026-3919
Google Chrome <146.0.7680.71 - Use After Free
Use after free in Extensions in Google Chrome prior to 146.0.7680.71 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE-416 Mar 11, 2026
CVE-2026-3918
Google Chrome <146.0.7680.71 - Use After Free
Use after free in WebMCP in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE-416 Mar 11, 2026
CVE-2026-3917
Google Chrome <146.0.7680.71 - Use After Free
Use after free in Agents in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE-416 Mar 11, 2026
CVE-2026-3805 7.5 HIGH EPSS 0.00
curl - Use After Free
When doing a second SMB request to the same host again, curl would wrongly use a data pointer pointing into already freed memory.
CWE-416 Mar 11, 2026
CVE-2026-27278 7.8 HIGH EPSS 0.00
Acrobat Reader <25.001.21265 - Use After Free
Acrobat Reader versions 24.001.30307, 24.001.30308, 25.001.21265 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CWE-416 Mar 10, 2026
CVE-2026-27220 7.8 HIGH EPSS 0.00
Acrobat Reader <25.001.21265 - Use After Free
Acrobat Reader versions 24.001.30307, 24.001.30308, 25.001.21265 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CWE-416 Mar 10, 2026
CVE-2026-0121 2.9 LOW EPSS 0.00
VPU - Use After Free
In VPU, there is a possible use-after-free read due to a race condition. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-362 Mar 10, 2026
CVE-2026-0112 7.4 HIGH EPSS 0.00
vpu_ioctl.c - Use After Free
In vpu_open_inst of vpu_ioctl.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-362 Mar 10, 2026
CVE-2026-26330 5.3 MEDIUM EPSS 0.00
Envoy <1.37.1 - DoS
Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, At the rate limit filter, if the response phase limit with apply_on_stream_done in the rate limit configuration is enabled and the response phase limit request fails directly, it may crash Envoy. When both the request phase limit and response phase limit are enabled, the safe gRPC client instance will be re-used for both the request phase request and response phase request. But after the request phase request is done, the inner state of the request phase limit request in gRPC client is not cleaned up. When a second limit request is sent at response phase, and the second limit request fails directly, the previous request's inner state may be accessed and result in crash. This vulnerability is fixed in 1.37.1, 1.36.5, 1.35.8, and 1.34.13.
CWE-416 Mar 10, 2026
CVE-2026-26311 5.9 MEDIUM EPSS 0.00
Envoy <1.37.1/1.36.5/1.35.8/1.34.13 - Use After Free
Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, a logic vulnerability in Envoy's HTTP connection manager (FilterManager) that allows for Zombie Stream Filter Execution. This issue creates a "Use-After-Free" (UAF) or state-corruption window where filter callbacks are invoked on an HTTP stream that has already been logically reset and cleaned up. The vulnerability resides in source/common/http/filter_manager.cc within the FilterManager::decodeData method. The ActiveStream object remains valid in memory during the deferred deletion window. If a DATA frame arrives on this stream immediately after the reset (e.g., in the same packet processing cycle), the HTTP/2 codec invokes ActiveStream::decodeData, which cascades to FilterManager::decodeData. FilterManager::decodeData fails to check the saw_downstream_reset_ flag. It iterates over the decoder_filters_ list and invokes decodeData() on filters that have already received onDestroy(). This vulnerability is fixed in 1.37.1, 1.36.5, 1.35.8, and 1.34.13.
CWE-416 Mar 10, 2026
CVE-2026-27277 7.8 HIGH EPSS 0.00
Substance3D Stager <3.1.7 - Use After Free
Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CWE-416 Mar 10, 2026
CVE-2026-27276 7.8 HIGH EPSS 0.00
Substance3D Stager <3.1.7 - Use After Free
Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CWE-416 Mar 10, 2026
CVE-2026-3847 8.8 HIGH EPSS 0.00
Firefox <148.0.2 - Memory Corruption
Memory safety bugs present in Firefox 148.0.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 148.0.2.
CWE-119 Mar 10, 2026
CVE-2026-30978 7.8 HIGH EPSS 0.00
iccDEV <2.3.1.5 - Use After Free
iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a heap-use-after-free in CIccCmm::AddXform() causing invalid vptr dereference and crash. This vulnerability is fixed in 2.3.1.5.
CWE-825 Mar 10, 2026