CWE-416: Use After Free
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Yearly Trend
Top Affected Vendors
All Use After Free CVEs (2,262)
A use-after-free vulnerability in Adobe InCopy allows arbitrary code execution when a user opens a malicious file. This affects users running vulnerab...
Nov 11, 2025Adobe InDesign versions 20.5, 19.5.5 and earlier contain a use-after-free vulnerability that could allow arbitrary code execution when a user opens a ...
Nov 11, 2025This vulnerability allows remote attackers to execute arbitrary code on Ashlar-Vellum Cobalt installations by tricking users into opening malicious CO...
Oct 29, 2025A use-after-free vulnerability in GCC Productions Inc. Fade In 4.2.0's XML parser allows heap-based memory corruption when processing malicious .xml f...
Oct 28, 2025Adobe Animate versions 23.0.13, 24.0.10 and earlier contain a use-after-free vulnerability that could allow attackers to execute arbitrary code on a v...
Oct 15, 2025CVE-2025-61802 is a use-after-free vulnerability in Substance3D Stager that could allow arbitrary code execution when a user opens a malicious file. T...
Oct 14, 2025Adobe Framemaker versions 2020.9, 2022.7 and earlier contain a use-after-free vulnerability that could allow attackers to execute arbitrary code when ...
Oct 14, 2025This vulnerability is a use-after-free flaw in the Windows Bluetooth Service that allows an authenticated attacker to execute arbitrary code with elev...
Oct 14, 2025A use-after-free vulnerability in Microsoft Office Excel allows attackers to execute arbitrary code on a victim's system by tricking them into opening...
Oct 14, 2025This vulnerability is a use-after-free flaw in the Windows Bluetooth Service that allows an authenticated attacker to execute arbitrary code with elev...
Oct 14, 2025A use-after-free vulnerability in V-SFT v6.2.7.0 and earlier allows attackers to execute arbitrary code, crash systems, or disclose information by tri...
Oct 10, 2025A use-after-free vulnerability in the Linux kernel's Bluetooth subsystem allows attackers to cause denial of service (system crashes) or potentially e...
Oct 7, 2025A use-after-free vulnerability in the Linux kernel's octeon_ep driver allows local attackers to potentially crash the system or execute arbitrary code...
Oct 7, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's ASoC (Audio System on Chip) lpass driver that allows reading kernel memory out...
Oct 7, 2025This CVE-2023-53645 is a use-after-free vulnerability in the Linux kernel's BPF subsystem where bpf_refcount_acquire could increment a zero refcount o...
Oct 7, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's Microchip clock driver. When auxiliary device registration fails, the release ...
Oct 7, 2025This is a use-after-free vulnerability in the Linux kernel's Distributed Lock Manager (DLM) midcomms component. It allows attackers with local access ...
Oct 7, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's netfilter conntrack subsystem. When nf_conntrack initialization fails, the nf_...
Oct 7, 2025A use-after-free vulnerability in the Linux kernel's block multi-queue (blk-mq) subsystem allows local attackers to cause kernel panics or potentially...
Oct 7, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's si470x USB radio driver. When the driver fails to initialize properly, it does...
Oct 7, 2025This is a use-after-free vulnerability in the Linux kernel's DAX (Direct Access) subsystem. It allows local attackers to potentially cause a kernel pa...
Oct 4, 2025A race condition in the Linux kernel's nilfs2 filesystem driver allows a use-after-free vulnerability when terminating the segment constructor thread....
Oct 4, 2025This is a use-after-free vulnerability in the Linux kernel's ring buffer subsystem where IRQ work could access freed memory during buffer destruction....
Oct 4, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's i.MX SCU clock driver. An attacker with local access could exploit this to cau...
Oct 4, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's block crypto subsystem. If exploited, it could allow local attackers to cause ...
Oct 4, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's F2FS filesystem driver, specifically in how cached IPU (In-Place Update) bios ...
Oct 4, 2025CVE-2022-50507 is a use-after-free vulnerability in the Linux kernel's NTFS3 filesystem driver. Attackers can trigger this vulnerability by mounting a...
Oct 4, 2025This is a use-after-free vulnerability in the Linux kernel's MSM DRM driver that occurs during device probe deferral. When the kernel tears down and r...
Oct 4, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's dm-cache subsystem that occurs when dm_resume() and dm_destroy() operations ha...
Oct 4, 2025This is a use-after-free vulnerability in the Linux kernel's BFQ I/O scheduler that allows local attackers to potentially crash the system or execute ...
Oct 4, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's virtio_uml driver. When device registration fails during probe, incorrect flag...
Oct 4, 2025A use-after-free vulnerability in the Linux kernel's octeontx2-pf driver allows attackers to potentially crash the system or execute arbitrary code. T...
Oct 4, 2025CVE-2025-61692 is a use-after-free vulnerability in VT STUDIO versions 8.53 and earlier that allows arbitrary code execution when processing specially...
Oct 2, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's virtio-mmio driver. When exploited, it allows attackers with local access to c...
Oct 1, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's RDMA/bnxt_re driver. An attacker with local access could potentially exploit t...
Oct 1, 2025A use-after-free vulnerability in the Linux kernel's xfrm subsystem when handling IPv6 packets with specific qdisc configurations. This allows attacke...
Oct 1, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's XTS (XEX-based tweaked-codebook mode with ciphertext stealing) cryptographic m...
Oct 1, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's CPU affinity notification mechanism. When specific functions are called with N...
Oct 1, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's CXL (Compute Express Link) driver. When the cxl_parse_cfmws() function fails t...
Oct 1, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's HID mcp-2221 driver. When a specific USB device is rapidly plugged and unplugg...
Oct 1, 2025This is a use-after-free vulnerability in the Linux kernel's HID multitouch driver. When exploited, it allows attackers to potentially execute arbitra...
Oct 1, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's nouveau graphics driver. When nouveau_gem_prime_import_sg_table() fails to ini...
Oct 1, 2025A use-after-free vulnerability in the Linux kernel's EFI subsystem allows attackers to potentially execute arbitrary code or cause system crashes. Thi...
Oct 1, 2025This is a use-after-free vulnerability in the Linux kernel's kernfs subsystem that allows local attackers to cause memory corruption and potentially e...
Oct 1, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's rpmsg character device driver. When a remoteproc is stopped before closing the...
Oct 1, 2025A use-after-free vulnerability in the Linux kernel's libsas subsystem allows local attackers to potentially crash the system or execute arbitrary code...
Oct 1, 2025This is a use-after-free vulnerability in the Linux kernel's ACPICA subsystem that allows local attackers to potentially execute arbitrary code or cau...
Oct 1, 2025A use-after-free vulnerability in the Linux kernel's Intel Versatile Processing Unit (VPU) accelerator driver could allow local attackers to crash the...
Oct 1, 2025A memory corruption vulnerability in Qualcomm image encoding components allows attackers to execute arbitrary code or cause denial of service. This af...
Sep 24, 2025This CVE describes a use-after-free vulnerability in Qualcomm camera kernel drivers where improper reference counting of CPU buffers during config_dev...
Sep 24, 2025About Use After Free (CWE-416)
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Our database tracks 2,262 CVEs classified as CWE-416, with 165 rated critical and 1,942 rated high severity. The average CVSS score for Use After Free vulnerabilities is 7.9.
External reference: View CWE-416 on MITRE CWE →
Monitor Use After Free Vulnerabilities
Get alerted when new Use After Free CVEs affect your infrastructure.
Start Monitoring Free