CWE-416: Use After Free
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Yearly Trend
Top Affected Vendors
All Use After Free CVEs (2,228)
This is a use-after-free vulnerability in ANGLE (Almost Native Graphics Layer Engine) component of Google Chrome that allows heap corruption. Attacker...
Aug 26, 2021This is a use-after-free vulnerability in Apple's WebKit browser engine that could allow arbitrary code execution when processing malicious web conten...
Aug 24, 2021This is a use-after-free vulnerability in Apple's WebKit browser engine that allows arbitrary code execution when processing malicious web content. It...
Aug 24, 2021CVE-2020-21688 is a heap-use-after-free vulnerability in FFmpeg's memory management function that allows attackers to execute arbitrary code on affect...
Aug 10, 2021A use-after-free vulnerability in Foxit PDF Reader's JavaScript engine allows arbitrary code execution when a user opens a malicious PDF file. This af...
Aug 5, 2021This vulnerability allows a malicious webpage to trigger a use-after-free memory corruption in Mozilla browsers when accessibility features are enable...
Aug 5, 2021This is a use-after-free vulnerability in Google Chrome's UI framework that allows remote attackers to potentially exploit heap corruption via a craft...
Aug 3, 2021This is a use-after-free vulnerability in Chrome DevTools that allows heap corruption when a user with a malicious extension visits a crafted HTML pag...
Aug 3, 2021This vulnerability allows remote attackers to potentially exploit heap corruption via a crafted HTML page in Google Chrome on Windows. It affects Chro...
Aug 3, 2021This is a use-after-free vulnerability in Chrome DevTools that could allow heap corruption. Attackers who convince users to open DevTools could potent...
Aug 3, 2021This is a use-after-free vulnerability in SQLite within Google Chrome that allows remote attackers to potentially exploit heap corruption. Attackers c...
Aug 3, 2021This is a use-after-free vulnerability in Chrome's GPU component that allows remote attackers to potentially exploit heap corruption via a crafted HTM...
Aug 3, 2021This is a use-after-free vulnerability in Chrome's V8 JavaScript engine that allows remote attackers to potentially exploit heap corruption. Attackers...
Aug 3, 2021This is a use-after-free vulnerability in Chrome's Blink XSLT processor that allows remote attackers to potentially exploit heap corruption. Attackers...
Aug 3, 2021This vulnerability is a use-after-free memory corruption flaw in Chrome's WebSerial API that allows attackers to potentially execute arbitrary code or...
Aug 3, 2021This is a use-after-free vulnerability in WebKitGTK browser that allows remote code execution when users visit malicious websites. It affects WebKitGT...
Jul 8, 2021This is a use-after-free vulnerability in Google Chrome's Sharing component that allows heap corruption. Attackers can exploit it by tricking users in...
Jul 2, 2021CVE-2021-28562 is a use-after-free vulnerability in Adobe Acrobat Reader DC that allows arbitrary code execution when processing malicious PDF files w...
Jun 28, 2021This is a use-after-free vulnerability in Chrome's Accessibility component that allows heap corruption. Attackers can exploit it by tricking users int...
Jun 15, 2021This is a use-after-free vulnerability in Chrome's extension system that allows heap corruption. Attackers can exploit it by tricking users into insta...
Jun 15, 2021This is a use-after-free vulnerability in Chrome's Back/Forward Cache (BFCache) that allows remote attackers to potentially exploit heap corruption. A...
Jun 15, 2021This is a use-after-free vulnerability in Chrome's Autofill feature that allows remote attackers to potentially exploit heap corruption. Attackers can...
Jun 15, 2021This is a use-after-free vulnerability in Chrome's Loader component that allows remote attackers to potentially exploit heap corruption. Attackers can...
Jun 15, 2021This is a use-after-free vulnerability in Chrome's WebAudio component that allows remote attackers to potentially exploit heap corruption. Attackers c...
Jun 7, 2021This is a use-after-free vulnerability in Chrome's TabStrip component that allows heap corruption. Attackers can exploit it by convincing users to ins...
Jun 7, 2021This is a use-after-free vulnerability in Chrome's WebAuthentication API on Android that allows heap corruption. Attackers who compromise the renderer...
Jun 7, 2021This is a use-after-free vulnerability in Google Chrome's Tab Strip component that allows heap corruption. Attackers can exploit it by convincing user...
Jun 7, 2021This is a use-after-free vulnerability in Google Chrome's Tab Strip component that allows heap corruption. Attackers can exploit it by convincing user...
Jun 4, 2021This is a use-after-free vulnerability in Chrome's Aura window manager that allows remote attackers to potentially exploit heap corruption. Attackers ...
Jun 4, 2021This is a use-after-free vulnerability in Google Chrome's Notifications feature that allows heap corruption. Attackers who have already compromised th...
Jun 4, 2021This is a use-after-free vulnerability in Chrome's Autofill feature that allows a remote attacker who has already compromised the renderer process to ...
Jun 4, 2021This vulnerability in the Arm Mali GPU kernel driver allows unprivileged users to access freed memory, potentially leading to information disclosure o...
May 24, 2021A use-after-free vulnerability in libxml2 versions before 2.9.11 allows attackers to submit crafted XML files to applications using this library, pote...
May 18, 2021A use-after-free vulnerability in Foxit PDF Reader's JavaScript engine allows arbitrary code execution when users open malicious PDF files. This affec...
May 10, 2021This vulnerability in the Arm Mali GPU kernel driver allows attackers to escalate privileges or disclose sensitive information due to mishandled GPU m...
May 10, 2021This is a use-after-free vulnerability in Chrome's Dev Tools that allows remote attackers to potentially exploit heap corruption via a crafted HTML pa...
Apr 30, 2021This is a use-after-free vulnerability in Google Chrome's Blink rendering engine that allows remote attackers to potentially exploit heap corruption. ...
Apr 26, 2021This is a use-after-free vulnerability in Chrome's WebMIDI implementation that allows remote attackers to potentially exploit heap corruption. Attacke...
Apr 26, 2021This vulnerability is a use-after-free memory corruption flaw in Google Chrome's screen sharing feature. It allows remote attackers to potentially exe...
Apr 9, 2021CVE-2021-26411 is a memory corruption vulnerability in Internet Explorer that allows remote attackers to execute arbitrary code on affected systems. I...
Mar 11, 2021This is a use-after-free vulnerability in Chrome's Network Internals component on Linux systems. It allows remote attackers to potentially execute arb...
Mar 9, 2021This is a use-after-free vulnerability in Chrome's Blink rendering engine that allows remote attackers to potentially execute arbitrary code via a cra...
Mar 9, 2021This is a use-after-free vulnerability in Google Chrome's bookmarks feature that allows remote attackers to potentially exploit heap corruption. Attac...
Mar 9, 2021This vulnerability is a use-after-free memory corruption flaw in Chrome's WebRTC component that allows remote attackers to potentially execute arbitra...
Mar 9, 2021This vulnerability allows remote code execution through a use-after-free flaw in WebKitGTK's AudioSourceProviderGStreamer component. Attackers can exp...
Mar 3, 2021CVE-2021-21035 is a use-after-free vulnerability in Adobe Acrobat Reader DC that allows arbitrary code execution when a user opens a malicious PDF fil...
Feb 11, 2021CVE-2021-21021 is a use-after-free vulnerability in Adobe Acrobat Reader DC that allows arbitrary code execution when a user opens a malicious PDF fil...
Feb 11, 2021CVE-2021-21028 is a use-after-free vulnerability in Adobe Acrobat Reader DC that allows arbitrary code execution when a user opens a malicious PDF fil...
Feb 11, 2021This CVE describes a use-after-free vulnerability in Adobe Acrobat Reader DC that allows arbitrary code execution when a user opens a malicious PDF fi...
Feb 11, 2021This is a use-after-free vulnerability in Chrome's media component that allows a remote attacker who has already compromised the renderer process to p...
Feb 9, 2021About Use After Free (CWE-416)
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Our database tracks 2,228 CVEs classified as CWE-416, with 160 rated critical and 1,913 rated high severity. The average CVSS score for Use After Free vulnerabilities is 7.9.
External reference: View CWE-416 on MITRE CWE →
Monitor Use After Free Vulnerabilities
Get alerted when new Use After Free CVEs affect your infrastructure.
Start Monitoring Free