CVE & Exploit Intelligence Database

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,847 CVEs tracked 53,242 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,918 Nuclei templates 37,802 vendors 42,493 researchers
6,619 results Clear all
CVE-2010-4168 7.5 HIGH EPSS 0.03
Openttd < 1.0.5 - Use After Free
Multiple use-after-free vulnerabilities in OpenTTD 1.0.x before 1.0.5 allow (1) remote attackers to cause a denial of service (invalid write and daemon crash) by abruptly disconnecting during transmission of the map from the server, related to network/network_server.cpp; (2) remote attackers to cause a denial of service (invalid read and daemon crash) by abruptly disconnecting, related to network/network_server.cpp; and (3) remote servers to cause a denial of service (invalid read and application crash) by forcing a disconnection during the join process, related to network/network.cpp.
CWE-416 Nov 17, 2010
CVE-2010-4201 9.8 CRITICAL EPSS 0.00
Google Chrome < 7.0.517.44 - Use After Free
Use-after-free vulnerability in Google Chrome before 7.0.517.44 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving text control selections.
CWE-416 Nov 06, 2010
CVE-2010-4197 9.8 CRITICAL EPSS 0.06
Google Chrome < 7.0.517.44 - Use After Free
Use-after-free vulnerability in WebKit, as used in Google Chrome before 7.0.517.44, webkitgtk before 1.2.6, and other products, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving text editing.
CWE-416 Nov 06, 2010
CVE-2010-3962 8.1 HIGH KEV 4 PoCs Analysis EPSS 0.88
Microsoft Internet Explorer - Use After Free
Use-after-free vulnerability in Microsoft Internet Explorer 6, 7, and 8 allows remote attackers to execute arbitrary code via vectors related to Cascading Style Sheets (CSS) token sequences and the clip attribute, aka an "invalid flag reference" issue or "Uninitialized Memory Corruption Vulnerability," as exploited in the wild in November 2010.
CWE-416 Nov 05, 2010
CVE-2010-2941 9.8 CRITICAL EPSS 0.21
CUPS <1.4.4 - Use After Free
ipp.c in cupsd in CUPS 1.4.4 and earlier does not properly allocate memory for attribute values with invalid string data types, which allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly execute arbitrary code via a crafted IPP request.
CWE-416 Nov 05, 2010
CVE-2010-3328 8.8 HIGH EPSS 0.55
Microsoft Internet Explorer <9 - Use After Free
Use-after-free vulnerability in the CAttrArray::PrivateFind function in mshtml.dll in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code by setting an unspecified property of a stylesheet object, aka "Uninitialized Memory Corruption Vulnerability."
CWE-416 Oct 13, 2010
CVE-2010-1825 EPSS 0.01
Google Chrome < 6.0.472.59 - Use After Free
Use-after-free vulnerability in WebKit, as used in Google Chrome before 6.0.472.59, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to nested SVG elements.
CWE-416 Sep 24, 2010
CVE-2010-1824 EPSS 0.15
Google Chrome < 6.0.472.59 - Use After Free
Use-after-free vulnerability in WebKit, as used in Apple iTunes before 10.2 on Windows, Apple Safari, and Google Chrome before 6.0.472.59, allows remote attackers to execute arbitrary code or cause a denial of service via vectors related to SVG styles, the DOM tree, and error messages.
CWE-416 Sep 24, 2010
CVE-2010-1823 EPSS 0.02
Google Chrome < 6.0.472.59 - Use After Free
Use-after-free vulnerability in WebKit before r65958, as used in Google Chrome before 6.0.472.59, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger use of document APIs such as document.close during parsing, as demonstrated by a Cascading Style Sheets (CSS) file referencing an invalid SVG font, aka rdar problem 8442098.
CWE-416 Sep 24, 2010
CVE-2010-1772 8.8 HIGH EPSS 0.02
Google Chrome < 5.0.375.70 - Use After Free
Use-after-free vulnerability in page/Geolocation.cpp in WebCore in WebKit before r59859, as used in Google Chrome before 5.0.375.70, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted web site, related to failure to stop timers associated with geolocation upon deletion of a document.
CWE-416 Sep 24, 2010
CVE-2010-3257 EPSS 0.10
WebKit <4.1.3-5.0.3 - Use After Free
Use-after-free vulnerability in WebKit, as used in Apple Safari before 4.1.3 and 5.0.x before 5.0.3, Google Chrome before 6.0.472.53, and webkitgtk before 1.2.6, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving element focus.
CWE-416 Sep 07, 2010
CVE-2010-3252 EPSS 0.00
Google Chrome <6.0.472.53 - Memory Corruption
Use-after-free vulnerability in the Notifications presenter in Google Chrome before 6.0.472.53 allows attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
CWE-416 Sep 07, 2010
CVE-2010-3116 EPSS 0.10
WebKit <4.1.3-5.0.3 - Use After Free
Multiple use-after-free vulnerabilities in WebKit, as used in Apple Safari before 4.1.3 and 5.0.x before 5.0.3, Google Chrome before 5.0.375.127, and webkitgtk before 1.2.6, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to improper handling of MIME types by plug-ins.
CWE-416 Aug 24, 2010
CVE-2010-2547 8.1 HIGH EPSS 0.15
Gnupg < 2.0.16 - Use After Free
Use-after-free vulnerability in kbx/keybox-blob.c in GPGSM in GnuPG 2.x through 2.0.16 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a certificate with a large number of Subject Alternate Names, which is not properly handled in a realloc operation when importing the certificate or verifying its signature.
CWE-416 Aug 05, 2010
CVE-2010-2753 8.8 HIGH EPSS 0.04
Mozilla Firefox <3.5.11 & <3.6.7 - RCE
Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code via a large selection attribute in a XUL tree element, which triggers a use-after-free.
CWE-190 Jul 30, 2010
CVE-2010-1208 8.8 HIGH EPSS 0.02
Mozilla Firefox <3.5.11 & SeaMonkey <2.0.6 - Use After Free
Use-after-free vulnerability in the attribute-cloning functionality in the DOM implementation in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via vectors related to deletion of an event attribute node with a nonzero reference count.
CWE-416 Jul 30, 2010
CVE-2010-2302 EPSS 0.06
Google Chrome < 5.0.375.70 - Use After Free
Use-after-free vulnerability in WebCore in WebKit in Google Chrome before 5.0.375.70 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via vectors involving remote fonts in conjunction with shadow DOM trees, aka rdar problem 8007953. NOTE: this might overlap CVE-2010-1771.
CWE-416 Jun 15, 2010
CVE-2010-2300 1 PoC Analysis EPSS 0.23
Google Chrome < 5.0.375.70 - Use After Free
Use-after-free vulnerability in the Element::normalizeAttributes function in dom/Element.cpp in WebCore in WebKit in Google Chrome before 5.0.375.70 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to handlers for DOM mutation events, aka rdar problem 7948784. NOTE: this might overlap CVE-2010-1759.
CWE-416 Jun 15, 2010
CVE-2010-1437 7.0 HIGH 1 PoC Analysis EPSS 0.00
Linux kernel <2.6.34-rc5 - DoS
Race condition in the find_keyring_by_name function in security/keys/keyring.c in the Linux kernel 2.6.34-rc5 and earlier allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via keyctl session commands that trigger access to a dead keyring that is undergoing deletion by the key_cleanup function.
CWE-362 May 07, 2010
CVE-2010-0629 6.5 MEDIUM EPSS 0.02
MIT Kerberos 5 < 1.6.3 - Use After Free
Use-after-free vulnerability in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote authenticated users to cause a denial of service (daemon crash) via a request from a kadmin client that sends an invalid API version number.
CWE-416 Apr 07, 2010