Search for vulnerabilities
| Vulnerability ID | VCID-7mgc-2v4y-9bce |
| Aliases |
CVE-2026-7338
|
| Summary | Use after free in Cast in Google Chrome prior to 147.0.7727.138 allowed an attacker on the local network segment to potentially exploit heap corruption via malicious network traffic. (Chromium security severity: High) |
| Status | Published |
| Exploitability | 0.5 |
| Weighted Severity | 7.9 |
| Risk | 4.0 |
| Affected and Fixed Packages | Package Details |
| CWE-825 | Expired Pointer Dereference |
| CWE-416 | Use After Free |
| System | Score | Found at |
|---|---|---|
| cvssv3 | 8.8 | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-7338.json |
| epss | 3e-05 | https://api.first.org/data/v1/epss?cve=CVE-2026-7338 |
| cvssv3.1 | 7.5 | https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_28.html |
| ssvc | Track | https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_28.html |
| cvssv3.1 | 7.5 | https://issues.chromium.org/issues/502449857 |
| ssvc | Track | https://issues.chromium.org/issues/502449857 |
| Reference id | Reference type | URL |
|---|---|---|
| https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-7338.json | ||
| https://api.first.org/data/v1/epss?cve=CVE-2026-7338 | ||
| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-7338 | ||
| 2463660 | https://bugzilla.redhat.com/show_bug.cgi?id=2463660 | |
| 502449857 | https://issues.chromium.org/issues/502449857 | |
| stable-channel-update-for-desktop_28.html | https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_28.html |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Percentile | 0.00086 |
| EPSS Score | 3e-05 |
| Published At | April 29, 2026, 12:55 p.m. |
| Date | Actor | Action | Source | VulnerableCode Version |
|---|---|---|---|---|
| 2026-04-29T12:11:55.259650+00:00 | Debian Oval Importer | Import | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 38.5.0 |