CWE-416: Use After Free
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Yearly Trend
Top Affected Vendors
All Use After Free CVEs (2,252)
NVIDIA vGPU software contains a use-after-free vulnerability in the Virtual GPU Manager that allows a malicious guest VM to access heap memory after i...
Jan 28, 2026A use-after-free vulnerability in the Linux kernel's Tegra ADMA driver allows memory corruption when audio streams terminate during XRUN conditions. T...
Jan 25, 2026A race condition in the Linux kernel's ublk driver allows use-after-free when partition scanning occurs during device teardown. This vulnerability cou...
Jan 23, 2026This CVE describes a race condition vulnerability in the Linux kernel's NFS server (nfsd) that can lead to use-after-free memory corruption. The issue...
Jan 23, 2026This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious SKP files in Trimble SketchUp. Attackers...
Jan 23, 2026CVE-2026-21287 is a use-after-free vulnerability in Substance3D Stager that allows arbitrary code execution when a user opens a malicious file. This a...
Jan 13, 2026This vulnerability is a use-after-free memory corruption flaw in Microsoft Office Excel that allows an attacker to execute arbitrary code on a victim'...
Jan 13, 2026This is a use-after-free vulnerability in the Windows Win32K ICOMP component that allows an authenticated attacker to execute arbitrary code with elev...
Jan 13, 2026This CVE describes a use-after-free vulnerability in Windows Management Services that allows an authenticated attacker to execute arbitrary code with ...
Jan 13, 2026This CVE describes a use-after-free vulnerability in the Windows Win32K ICOMP component that allows an authenticated attacker to escalate privileges l...
Jan 13, 2026This CVE describes a use-after-free vulnerability in Desktop Windows Manager that allows an authenticated attacker to execute arbitrary code with elev...
Jan 13, 2026This vulnerability involves a use-after-free memory corruption flaw in Windows Management Services that allows an authenticated attacker to execute ar...
Jan 13, 2026This CVE describes a use-after-free vulnerability in Windows Kernel-Mode Drivers that allows an authenticated attacker to execute arbitrary code with ...
Jan 13, 2026This vulnerability involves a use-after-free flaw in Microsoft's Graphics Component that allows an authenticated attacker to execute arbitrary code wi...
Jan 13, 2026This CVE describes a use-after-free vulnerability in Imagination Technologies GPU drivers where improper reference counting allows non-privileged user...
Jan 13, 2026This CVE describes a use-after-free vulnerability in the Linux kernel's ksmbd SMB server module. Under high concurrency conditions, a tree-connection ...
Jan 13, 2026A use-after-free vulnerability in Samsung's PROCA driver allows local attackers to potentially execute arbitrary code with kernel privileges. This aff...
Jan 9, 2026This vulnerability involves memory corruption during HDCP session deinitialization, potentially allowing attackers to execute arbitrary code or cause ...
Jan 7, 2026CVE-2025-20799 is a use-after-free vulnerability in c2ps that allows memory corruption. This enables local privilege escalation from System privilege ...
Jan 6, 2026This CVE describes a use-after-free memory corruption vulnerability in display components that could allow local privilege escalation. Attackers who a...
Jan 6, 2026This CVE describes a use-after-free memory corruption vulnerability in a display component that could allow local privilege escalation. Attackers who ...
Jan 6, 2026This CVE describes a use-after-free vulnerability in the Linux kernel's HID uclogic driver. When the input device is unregistered, it can trigger a ue...
Dec 30, 2025This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious XCF files in GIMP. The use-after-free fl...
Dec 23, 2025A use-after-free vulnerability in Foxit PDF Reader's PDF parsing allows remote code execution when opening malicious PDF files. This affects Windows u...
Dec 19, 2025A use-after-free vulnerability in Foxit PDF Reader's annotation handling allows remote code execution when opening malicious PDF files containing craf...
Dec 19, 2025A use-after-free vulnerability in Foxit PDF software allows remote code execution when opening malicious PDF files containing crafted JavaScript. This...
Dec 19, 2025A use-after-free vulnerability in NI LabVIEW's sentry!sentry_span_set_data() function when parsing corrupted VI files could allow information disclosu...
Dec 18, 2025This vulnerability allows memory corruption when a user-space application makes concurrent memory mapping and unmapping requests. It affects systems u...
Dec 18, 2025This vulnerability allows attackers to cause memory corruption through improper handling of IOCTL calls when setting modes. Successful exploitation co...
Dec 18, 2025This vulnerability allows memory corruption in Qualcomm video processing components when a video session fails to open due to timeout errors. Attacker...
Dec 18, 2025A Use After Free vulnerability in AzeoTech DAQFactory allows attackers to execute arbitrary code by tricking users into opening malicious .ctl files. ...
Dec 11, 2025A use-after-free vulnerability in GRUB's gettext module allows attackers to invoke an orphaned command after module unloading, causing memory access t...
Nov 18, 2025A use-after-free vulnerability in Autodesk 3ds Max allows malicious DWG files to cause crashes, data leaks, or arbitrary code execution when opened. T...
Nov 12, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's TLS implementation. When setsockopt() is called, get_netdev_for_sock() could a...
Nov 12, 2025A use-after-free vulnerability in Substance3D Stager versions 3.1.5 and earlier allows attackers to execute arbitrary code when a user opens a malicio...
Nov 11, 2025CVE-2025-61834 is a use-after-free vulnerability in Substance3D Stager that could allow arbitrary code execution when a user opens a malicious file. T...
Nov 11, 2025This vulnerability is a use-after-free memory corruption flaw in Microsoft Office that allows an attacker to execute arbitrary code on a victim's syst...
Nov 11, 2025A use-after-free vulnerability in Microsoft Office Word allows attackers to execute arbitrary code on a victim's system by tricking them into opening ...
Nov 11, 2025CVE-2025-62199 is a use-after-free vulnerability in Microsoft Office that allows an attacker to execute arbitrary code on a victim's system by trickin...
Nov 11, 2025This vulnerability is a use-after-free flaw in Microsoft Office Excel that allows an unauthorized attacker to execute arbitrary code on a victim's sys...
Nov 11, 2025CVE-2025-60707 is a use-after-free vulnerability in Windows Multimedia Class Scheduler Service (MMCSS) that allows authenticated attackers to execute ...
Nov 11, 2025Adobe InDesign versions 20.5, 19.5.5 and earlier contain a use-after-free vulnerability that could allow attackers to execute arbitrary code when a us...
Nov 11, 2025Adobe InCopy versions 20.5, 19.5.5 and earlier contain a use-after-free vulnerability that could allow attackers to execute arbitrary code when a user...
Nov 11, 2025A use-after-free vulnerability in Adobe InCopy allows arbitrary code execution when a user opens a malicious file. This affects users running vulnerab...
Nov 11, 2025Adobe InDesign versions 20.5, 19.5.5 and earlier contain a use-after-free vulnerability that could allow arbitrary code execution when a user opens a ...
Nov 11, 2025This vulnerability allows remote attackers to execute arbitrary code on Ashlar-Vellum Cobalt installations by tricking users into opening malicious CO...
Oct 29, 2025A use-after-free vulnerability in GCC Productions Inc. Fade In 4.2.0's XML parser allows heap-based memory corruption when processing malicious .xml f...
Oct 28, 2025Adobe Animate versions 23.0.13, 24.0.10 and earlier contain a use-after-free vulnerability that could allow attackers to execute arbitrary code on a v...
Oct 15, 2025CVE-2025-61802 is a use-after-free vulnerability in Substance3D Stager that could allow arbitrary code execution when a user opens a malicious file. T...
Oct 14, 2025Adobe Framemaker versions 2020.9, 2022.7 and earlier contain a use-after-free vulnerability that could allow attackers to execute arbitrary code when ...
Oct 14, 2025About Use After Free (CWE-416)
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Our database tracks 2,252 CVEs classified as CWE-416, with 164 rated critical and 1,933 rated high severity. The average CVSS score for Use After Free vulnerabilities is 7.9.
External reference: View CWE-416 on MITRE CWE →
Monitor Use After Free Vulnerabilities
Get alerted when new Use After Free CVEs affect your infrastructure.
Start Monitoring Free