CWE-416: Use After Free

Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

2,232
Total CVEs
160
Critical
1,917
High
7.9
Avg CVSS
10
In CISA KEV

Yearly Trend

2026
104
2025
719
2024
659
2023
248
2022
207

Top Affected Vendors

1 Linux 766
2 Google 359
3 Microsoft 258
4 Debian 198
5 Fedoraproject 173
6 Adobe 123
7 Foxit 84
8 Qualcomm 79
9 Apple 68
10 Mozilla 49

All Use After Free CVEs (2,232)

CVE-2020-16044
8.8

This vulnerability allows remote attackers to potentially execute arbitrary code or cause denial of service via heap corruption in Chrome's WebRTC imp...

Feb 9, 2021
CVE-2021-21112
8.8

This is a use-after-free vulnerability in Chrome's Blink rendering engine that allows remote attackers to potentially execute arbitrary code or cause ...

Jan 8, 2021
CVE-2021-21114
8.8

This is a use-after-free vulnerability in Chrome's audio component that allows remote attackers to potentially exploit heap corruption. Attackers can ...

Jan 8, 2021
CVE-2020-16039
8.8

This is a use-after-free vulnerability in Chrome's extensions component that allows remote attackers to potentially exploit heap corruption. Attackers...

Jan 8, 2021
CVE-2020-16026
8.8

This is a use-after-free vulnerability in Chrome's WebRTC component that allows remote attackers to potentially exploit heap corruption. Attackers can...

Jan 8, 2021
CVE-2020-16037
8.8

This is a use-after-free vulnerability in Google Chrome's clipboard component that allows remote attackers to potentially exploit heap corruption. Att...

Jan 8, 2021
CVE-2020-29569
8.8

A use-after-free vulnerability in the Linux kernel's Xen PV block backend allows a malicious guest VM to crash the host (dom0) by rapidly connecting a...

Dec 15, 2020
CVE-2020-26959
8.8

This is a use-after-free vulnerability in Mozilla Firefox, Firefox ESR, and Thunderbird that occurs during browser shutdown. Attackers could exploit t...

Dec 9, 2020
CVE-2020-26950
8.8

This vulnerability is a use-after-free condition in Firefox's JavaScript engine that allows remote code execution when exploited. Attackers can craft ...

Dec 9, 2020
CVE-2020-9947
8.8

CVE-2020-9947 is a use-after-free vulnerability in Apple's WebKit browser engine that allows arbitrary code execution when processing malicious web co...

Dec 8, 2020
CVE-2020-9950
8.8

This is a use-after-free vulnerability in Apple's WebKit browser engine that could allow arbitrary code execution when processing malicious web conten...

Dec 8, 2020
CVE-2020-13584
8.8

This CVE describes a use-after-free vulnerability in WebKitGTK that allows remote code execution when a user visits a malicious website. The vulnerabi...

Dec 3, 2020
CVE-2021-32781
8.6

CVE-2021-32781 is a use-after-free vulnerability in Envoy proxy that allows specifically crafted requests to cause denial of service. It affects Envoy...

Aug 24, 2021
CVE-2021-21207
8.6

This is a use-after-free vulnerability in Chrome's IndexedDB component that allows sandbox escape. Attackers can exploit it by convincing users to ins...

Apr 26, 2021
CVE-2021-21138
8.6

This vulnerability is a use-after-free memory corruption flaw in Chrome's DevTools that allows a local attacker to potentially escape the browser's se...

Feb 9, 2021
CVE-2025-0151
8.5

This CVE describes a use-after-free vulnerability in Zoom Workplace Apps that allows authenticated users to escalate privileges through network access...

Mar 11, 2025
CVE-2026-20953
8.4

This CVE describes a use-after-free vulnerability in Microsoft Office that allows an unauthorized attacker to execute arbitrary code on a victim's sys...

Jan 13, 2026
CVE-2026-20952
8.4

This CVE describes a use-after-free vulnerability in Microsoft Office that allows an unauthorized attacker to execute arbitrary code on a victim's sys...

Jan 13, 2026
CVE-2025-66627
8.4

CVE-2025-66627 is a use-after-free vulnerability in Wasmi's linear memory implementation that occurs under specific memory growth conditions. This all...

Dec 9, 2025
CVE-2025-22410
8.4

CVE-2025-22410 is a use-after-free vulnerability in Android's Bluetooth stack that allows local privilege escalation without user interaction. Attacke...

Aug 26, 2025
CVE-2025-22405
8.4

This CVE describes a use-after-free vulnerability in Android's Bluetooth stack that allows local privilege escalation without user interaction. Attack...

Aug 26, 2025
CVE-2025-53784
8.4

A use-after-free vulnerability in Microsoft Office Word allows attackers to execute arbitrary code on affected systems by tricking users into opening ...

Aug 12, 2025
CVE-2025-53731
8.4

A use-after-free vulnerability in Microsoft Office allows attackers to execute arbitrary code on a victim's system by tricking them into opening a mal...

Aug 12, 2025
CVE-2025-27128
8.4

CVE-2025-27128 is a use-after-free vulnerability in OpenHarmony's tcb (Trusted Computing Base) component that allows local attackers to execute arbitr...

Aug 11, 2025
CVE-2025-47957
8.4

This vulnerability is a use-after-free memory corruption flaw in Microsoft Office Word that allows an attacker to execute arbitrary code on a victim's...

Jun 10, 2025
CVE-2025-47164
8.4

A use-after-free vulnerability in Microsoft Office allows attackers to execute arbitrary code on affected systems by tricking users into opening malic...

Jun 10, 2025
CVE-2025-30386
8.4

A use-after-free vulnerability in Microsoft Office allows attackers to execute arbitrary code on affected systems by exploiting memory corruption afte...

May 13, 2025
CVE-2025-30377
8.4

This vulnerability is a use-after-free memory corruption flaw in Microsoft Office that allows an attacker to execute arbitrary code on a victim's syst...

May 13, 2025
CVE-2024-40649
8.4

CVE-2024-40649 is a use-after-free vulnerability in the Android kernel that allows local privilege escalation without requiring user interaction or ad...

Jan 28, 2025
CVE-2024-40651
8.4

This CVE describes a use-after-free vulnerability in the Android kernel that allows local privilege escalation without requiring user interaction. Att...

Jan 28, 2025
CVE-2024-40669
8.4

This CVE describes a use-after-free vulnerability in Android's TBD component caused by a race condition. It allows local attackers to escalate privile...

Jan 28, 2025
CVE-2024-40670
8.4

This CVE describes a use-after-free vulnerability in Android's TBD component caused by a race condition. It allows local attackers to escalate privile...

Jan 28, 2025
CVE-2024-34748
8.4

This CVE describes a use-after-free vulnerability in the Android kernel's devicemem_server.c component. It allows local attackers to escalate privileg...

Jan 28, 2025
CVE-2025-21362
8.4

This vulnerability allows attackers to execute arbitrary code on a victim's system by tricking them into opening a specially crafted Excel file. It af...

Jan 14, 2025
CVE-2024-38399
8.4

This vulnerability allows memory corruption through specially crafted user packets that trigger page faults in Qualcomm components. Attackers could po...

Oct 7, 2024
CVE-2024-33060
8.4

This vulnerability allows memory corruption when two threads simultaneously map and unmap a single node in Qualcomm components. Successful exploitatio...

Sep 2, 2024
CVE-2024-23365
8.4

CVE-2024-23365 is a use-after-free vulnerability in Qualcomm's MinkSocket component that allows memory corruption when releasing shared resources. Suc...

Sep 2, 2024
CVE-2024-33028
8.4

This CVE describes a use-after-free vulnerability in Qualcomm graphics drivers where a fence object may still be accessed after being released during ...

Aug 5, 2024
CVE-2024-23381
8.4

This vulnerability involves memory corruption when GPU SMMU fails to unmap memory mapped in a Vertex Buffer Object (VBO), potentially allowing attacke...

Aug 5, 2024
CVE-2024-23383
8.4

CVE-2024-23383 is a use-after-free vulnerability in Qualcomm kernel drivers that allows memory corruption when hardware fences are triggered. This cou...

Aug 5, 2024
CVE-2024-23373
8.4

This vulnerability allows memory corruption when IOMMU unmap operations fail, leading to improper release of DMA and anonymous buffers. It affects sys...

Jul 1, 2024
CVE-2022-48754
8.4

This CVE describes a use-after-free vulnerability in the Linux kernel's phylib subsystem. The vulnerability occurs when the kernel attempts to reset a...

Jun 20, 2024
CVE-2024-32503
8.4

A Use-After-Free vulnerability in Samsung Exynos mobile and wearable processors allows attackers to potentially execute arbitrary code or cause system...

Jun 7, 2024
CVE-2021-47456
8.4

This is a use-after-free vulnerability in the Linux kernel's peak_pci CAN bus driver that occurs during module removal. When exploited, it allows loca...

May 22, 2024
CVE-2024-23354
8.4

This vulnerability allows memory corruption when an IOCTL call is interrupted by a signal in Qualcomm components, potentially leading to arbitrary cod...

May 6, 2024
CVE-2024-21468
8.4

CVE-2024-21468 is a use-after-free vulnerability in Qualcomm GPU drivers where failed memory unmapping operations can lead to memory corruption. This ...

Apr 1, 2024
CVE-2024-21472
8.4

This vulnerability involves memory corruption in the kernel when handling GPU operations, allowing attackers to potentially execute arbitrary code wit...

Apr 1, 2024
CVE-2023-52629
8.4

A use-after-free vulnerability in the Linux kernel's SH architecture push-switch driver allows local attackers to potentially execute arbitrary code o...

Mar 29, 2024
CVE-2024-27213
8.4

This CVE describes a use-after-free vulnerability in Android's BroadcastSystemMessage function that allows remote code execution without user interact...

Mar 11, 2024
CVE-2024-25985
8.4

CVE-2024-25985 is a use-after-free vulnerability in the bigo_unlocked_ioctl function of bigo.c that allows local privilege escalation without requirin...

Mar 11, 2024

About Use After Free (CWE-416)

Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

Our database tracks 2,232 CVEs classified as CWE-416, with 160 rated critical and 1,917 rated high severity. The average CVSS score for Use After Free vulnerabilities is 7.9.

External reference: View CWE-416 on MITRE CWE →

Monitor Use After Free Vulnerabilities

Get alerted when new Use After Free CVEs affect your infrastructure.

Start Monitoring Free