CWE-416: Use After Free
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Yearly Trend
Top Affected Vendors
All Use After Free CVEs (2,251)
This is a use-after-free vulnerability in Google Chrome's navigation component that allows remote attackers to potentially exploit heap corruption via...
Feb 15, 2025CVE-2022-49043 is a use-after-free vulnerability in libxml2's xmlXIncludeAddNode function that allows attackers to execute arbitrary code or cause den...
Jan 26, 2025This vulnerability allows remote attackers to execute arbitrary code on affected systems by exploiting a use-after-free flaw in the SPNEGO Extended Ne...
Jan 14, 2025This vulnerability allows remote attackers to execute arbitrary code on Windows systems with Remote Desktop Services enabled. Attackers can exploit th...
Jan 14, 2025This vulnerability allows remote attackers to execute arbitrary code on Windows systems running the Line Printer Daemon (LPD) service. Attackers can e...
Jan 14, 2025A use-after-free vulnerability in FortiManager and FortiAnalyzer's fgfmsd daemon allows remote unauthenticated attackers to execute arbitrary code as ...
Dec 19, 2024This vulnerability allows attackers to execute arbitrary code on Windows systems through Remote Desktop Services. It affects Windows servers and works...
Dec 12, 2024This vulnerability allows remote attackers to execute arbitrary code on Windows systems by exploiting a use-after-free bug (CWE-416) in the Local Secu...
Dec 12, 2024This vulnerability in Windows Remote Desktop Services allows unauthorized attackers to execute arbitrary code remotely by exploiting improper memory l...
Dec 12, 2024This vulnerability allows remote attackers to execute arbitrary code on Windows systems running vulnerable Remote Desktop Services. Attackers can pote...
Dec 12, 2024This vulnerability allows remote attackers to execute arbitrary code on systems running Microsoft Message Queuing (MSMQ) by sending specially crafted ...
Dec 12, 2024This vulnerability allows remote attackers to execute arbitrary code on systems running Microsoft Message Queuing (MSMQ) by sending specially crafted ...
Dec 12, 2024This vulnerability allows remote attackers to execute arbitrary code on Windows systems with Remote Desktop Services enabled, potentially gaining full...
Dec 12, 2024This vulnerability allows remote attackers to execute arbitrary code on Windows systems running vulnerable Remote Desktop Services. Attackers can expl...
Dec 12, 2024This vulnerability allows non-privileged users to make improper GPU system calls, enabling unauthorized reads and writes of physical memory from GPU h...
Nov 30, 2024This vulnerability allows remote attackers to execute arbitrary code on Windows systems running vulnerable Remote Desktop Protocol (RDP) servers. Atta...
Oct 8, 2024A use-after-free vulnerability in the m2m scaler driver of Samsung Exynos mobile and wearable processors allows local attackers to escalate privileges...
Oct 7, 2024This vulnerability is a use-after-free memory corruption flaw in the GPU SLC (System Level Cache) driver for Pixel devices. It allows local attackers ...
Jun 13, 2024This CVE describes a use-after-free vulnerability in Firefox's SafeRefPtr component that could allow an attacker to trigger a crash or potentially exe...
Mar 19, 2024A use-after-free vulnerability in libdicom 1.0.5 allows attackers to execute arbitrary code or cause denial of service by tricking applications into p...
Feb 20, 2024This vulnerability in Windows MSHTML Platform allows remote attackers to execute arbitrary code by tricking users into opening specially crafted files...
Dec 12, 2023This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable Layer 2 Tunneling Protocol (L2TP) implementations. ...
Oct 10, 2023This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable Layer 2 Tunneling Protocol (L2TP) implementations. ...
Oct 10, 2023CVE-2023-41769 is a remote code execution vulnerability in Microsoft's Layer 2 Tunneling Protocol implementation that allows an unauthenticated attack...
Oct 10, 2023CVE-2023-41771 is a use-after-free vulnerability in Microsoft's Layer 2 Tunneling Protocol (L2TP) implementation that allows remote code execution. At...
Oct 10, 2023CVE-2023-41773 is a remote code execution vulnerability in Microsoft's Layer 2 Tunneling Protocol implementation. An attacker could exploit this to ex...
Oct 10, 2023CVE-2023-3297 is a use-after-free vulnerability in Ubuntu's accountsservice that allows an unprivileged local attacker to potentially execute arbitrar...
Sep 1, 2023This vulnerability allows remote attackers to execute arbitrary code on affected Windows systems by exploiting a use-after-free flaw in OLE (Object Li...
May 9, 2023This vulnerability in FFmpeg's libavcodec allows attackers to trigger a use-after-free condition in worker threads when processing certain video files...
Mar 29, 2023This CVE describes a use-after-free vulnerability in PJSIP library versions up to 2.11.1 that occurs in dialog set scenarios. When multiple UAC dialog...
Feb 22, 2022CVE-2021-22901 is a use-after-free vulnerability in curl/libcurl that allows a malicious TLS 1.3 server to potentially execute arbitrary code on the c...
Jun 11, 2021This CVE describes a use-after-free vulnerability in lib3mf's ZIP file handling that allows remote code execution. Attackers can exploit it by trickin...
Mar 10, 2021This CVE describes a use-after-free vulnerability in Node.js TLS implementation that can lead to memory corruption. Attackers could exploit this to ca...
Jan 6, 2021This vulnerability allows remote code execution via a use-after-free flaw in Android's Bluetooth Hands-Free Profile client component. Attackers can ex...
Nov 18, 2025This is a use-after-free vulnerability in the Linux kernel's Bluetooth L2CAP subsystem that allows an attacker to potentially execute arbitrary code o...
Sep 18, 2025This vulnerability in Android's Bluetooth stack allows remote attackers to execute arbitrary code on affected devices without user interaction. It aff...
Sep 4, 2025A use-after-free vulnerability in Intel PROSet/Wireless WiFi Software for Windows allows an unauthenticated attacker on the same network to potentiall...
May 13, 2025This CVE describes a use-after-free vulnerability in WebKitGTK's ImageLoader that can be exploited via malicious web pages. Attackers could potentiall...
Jul 7, 2021This vulnerability allows memory corruption when multiple processes concurrently access shared buffers through IOCTL calls in Qualcomm drivers. Attack...
Mar 2, 2026This vulnerability allows memory corruption when multiple processes concurrently access a shared buffer during IOCTL calls in Qualcomm components. Att...
Mar 2, 2026A race condition vulnerability in the Linux kernel's ksmbd (SMB server) component allows use-after-free attacks in multi-channel SMB sessions. This af...
Feb 18, 2026Adobe After Effects versions 25.6 and earlier contain a use-after-free vulnerability that could allow attackers to execute arbitrary code on a victim'...
Feb 10, 2026Adobe After Effects versions 25.6 and earlier contain a use-after-free vulnerability that could allow attackers to execute arbitrary code on a victim'...
Feb 10, 2026CVE-2026-21329 is a use-after-free vulnerability in Adobe After Effects that could allow arbitrary code execution when a user opens a malicious file. ...
Feb 10, 2026Adobe After Effects versions 25.6 and earlier contain a use-after-free vulnerability that could allow an attacker to execute arbitrary code on a victi...
Feb 10, 2026Adobe After Effects versions 25.6 and earlier contain a use-after-free vulnerability that could allow attackers to execute arbitrary code on a victim'...
Feb 10, 2026This CVE describes a use-after-free vulnerability in Qualcomm GPU memory management where improper pointer handling during buffer deallocation can cau...
Feb 2, 2026CVE-2025-47359 is a use-after-free vulnerability in Qualcomm memory management APIs that allows memory corruption when multiple threads simultaneously...
Feb 2, 2026This CVE describes a use-after-free vulnerability in the cameraisp component that could allow local privilege escalation. Attackers with System privil...
Feb 2, 2026This vulnerability in NVIDIA Display Driver for Windows allows attackers to exploit a use-after-free memory error. Successful exploitation could lead ...
Jan 28, 2026About Use After Free (CWE-416)
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Our database tracks 2,251 CVEs classified as CWE-416, with 164 rated critical and 1,932 rated high severity. The average CVSS score for Use After Free vulnerabilities is 7.9.
External reference: View CWE-416 on MITRE CWE →
Monitor Use After Free Vulnerabilities
Get alerted when new Use After Free CVEs affect your infrastructure.
Start Monitoring Free