CWE-416: Use After Free

Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

2,294
Total CVEs
175
Critical
1,964
High
8.0
Avg CVSS
10
In CISA KEV

Yearly Trend

2026
104
2025
719
2024
659
2023
248
2022
207

Top Affected Vendors

1 Linux 767
2 Google 385
3 Microsoft 258
4 Debian 224
5 Fedoraproject 192
6 Adobe 131
7 Foxit 84
8 Qualcomm 80
9 Apple 72
10 Mozilla 53

All Use After Free CVEs (2,294)

CVE-2023-53252
7.8

This is a use-after-free vulnerability in the Linux kernel's Bluetooth subsystem that allows local attackers to cause memory corruption, potentially l...

Sep 15, 2025
CVE-2023-53235
7.8

This CVE describes a use-after-free vulnerability in the Linux kernel's DRM (Direct Rendering Manager) test helpers. The vulnerability occurs during c...

Sep 15, 2025
CVE-2022-50328
7.8

This is a use-after-free vulnerability in the Linux kernel's jbd2 (journaling block device) subsystem. Attackers could potentially exploit this to cau...

Sep 15, 2025
CVE-2022-50305
7.8

This CVE describes a use-after-free vulnerability in the Linux kernel's ASoC (Audio System on Chip) driver for ES8336 audio codecs. When removing the ...

Sep 15, 2025
CVE-2022-50310
7.8

This CVE describes a use-after-free vulnerability in the Linux kernel's IPv6 multicast routing subsystem. When network namespace initialization fails,...

Sep 15, 2025
CVE-2022-50300
7.8

A use-after-free vulnerability in the Linux kernel's Btrfs filesystem driver allows local attackers to potentially crash the system or execute arbitra...

Sep 15, 2025
CVE-2022-50283
7.8

This CVE-2022-50283 is a use-after-free vulnerability in the Linux kernel's MTD subsystem caused by missing of_node_get() calls in dynamic partition c...

Sep 15, 2025
CVE-2022-50274
7.8

This CVE describes a use-after-free vulnerability in the Linux kernel's DVB (Digital Video Broadcasting) subsystem. When dvb_unregister_device() is ca...

Sep 15, 2025
CVE-2023-53187
7.8

This is a use-after-free vulnerability in the Linux kernel's Btrfs filesystem that occurs when a newly created block group becomes unused before its c...

Sep 15, 2025
CVE-2023-53153
7.8

This CVE describes a use-after-free vulnerability in the Linux kernel's cfg80211 WiFi subsystem. When using Wireless Extensions (wext), key informatio...

Sep 15, 2025
CVE-2022-50252
7.8

This is a use-after-free vulnerability in the Linux kernel's igb network driver that occurs during memory allocation failures. When the system is unde...

Sep 15, 2025
CVE-2022-50241
7.8

This is a use-after-free vulnerability in the Linux kernel's NFSD (Network File System Daemon) that occurs during inter-server copy operations. When a...

Sep 15, 2025
CVE-2022-50243
7.8

This is a use-after-free vulnerability in the Linux kernel's SCTP (Stream Control Transmission Protocol) implementation. When sctp_auth_asoc_init_acti...

Sep 15, 2025
CVE-2022-50245
7.8

This CVE describes a use-after-free vulnerability in the Linux kernel's RapidIO subsystem. When kfifo_alloc() fails during device opening, the driver ...

Sep 15, 2025
CVE-2025-39776
7.8

A use-after-free vulnerability in the Linux kernel's debug_vm_pgtable test module allows stale page table entries to persist after test completion. Wh...

Sep 11, 2025
CVE-2025-39740
7.8

This CVE describes a use-after-free vulnerability in the Linux kernel's Direct Rendering Manager (DRM) Xe graphics driver migration component. If expl...

Sep 11, 2025
CVE-2025-54258
7.8

CVE-2025-54258 is a use-after-free vulnerability in Substance3D Modeler that could allow arbitrary code execution when a user opens a malicious file. ...

Sep 9, 2025
CVE-2025-54257
7.8

A use-after-free vulnerability in Adobe Acrobat Reader allows arbitrary code execution when a user opens a malicious PDF file. This affects users runn...

Sep 9, 2025
CVE-2025-54242
7.8

CVE-2025-54242 is a use-after-free vulnerability in Adobe Premiere Pro that could allow arbitrary code execution when a user opens a malicious file. T...

Sep 9, 2025
CVE-2025-54906
7.8

This vulnerability in Microsoft Office involves a use-after-free memory corruption issue that allows an attacker to execute arbitrary code on a victim...

Sep 9, 2025
CVE-2025-54908
7.8

This vulnerability is a use-after-free memory corruption flaw in Microsoft Office PowerPoint that allows an unauthorized attacker to execute arbitrary...

Sep 9, 2025
CVE-2025-54904
7.8

This vulnerability is a use-after-free memory corruption flaw in Microsoft Office Excel that allows an attacker to execute arbitrary code on a victim'...

Sep 9, 2025
CVE-2025-54896
7.8

This vulnerability is a use-after-free memory corruption flaw in Microsoft Office Excel that allows an unauthorized attacker to execute arbitrary code...

Sep 9, 2025
CVE-2025-54102
7.8

CVE-2025-54102 is a use-after-free vulnerability in Windows Connected Devices Platform Service that allows an authenticated attacker to execute arbitr...

Sep 9, 2025
CVE-2025-39717
7.8

This Linux kernel vulnerability allows local users to bypass security restrictions and change identity mappings (id-mappings) on detached mount points...

Sep 5, 2025
CVE-2025-39691
7.8

This is a use-after-free vulnerability in the Linux kernel's buffer handling code that can lead to kernel memory corruption. It affects systems using ...

Sep 5, 2025
CVE-2025-38734
7.8

This CVE describes a use-after-free vulnerability in the Linux kernel's SMC (Shared Memory Communications) subsystem. The vulnerability allows an atta...

Sep 5, 2025
CVE-2025-38724
7.8

A use-after-free vulnerability in the Linux kernel's NFS server (nfsd) allows attackers to potentially crash the kernel or execute arbitrary code. Thi...

Sep 4, 2025
CVE-2025-38722
7.8

This is a use-after-free vulnerability in the Linux kernel's habanalabs driver export_dmabuf() function. It allows a local attacker to potentially esc...

Sep 4, 2025
CVE-2025-22438
7.8

This CVE describes a use-after-free vulnerability in Android's InputDispatcher component that allows local privilege escalation without user interacti...

Sep 2, 2025
CVE-2025-20705
7.8

CVE-2025-20705 is a use-after-free vulnerability in the monitor_hang component that could lead to memory corruption. This allows local privilege escal...

Sep 1, 2025
CVE-2024-58240
7.8

This CVE addresses a use-after-free vulnerability in the Linux kernel's TLS implementation that could allow local attackers to escalate privileges or ...

Aug 28, 2025
CVE-2025-38666
7.8

A race condition in the Linux kernel's Appletalk AARP proxy-probe routine allows a use-after-free vulnerability when an expire timer thread frees memo...

Aug 22, 2025
CVE-2025-38656
7.8

A use-after-free vulnerability in the Linux kernel's iwlwifi driver could allow local attackers to crash the system or potentially execute arbitrary c...

Aug 22, 2025
CVE-2025-38627
7.8

This is a use-after-free vulnerability in the Linux kernel's F2FS filesystem compression feature. It allows attackers to potentially crash the kernel ...

Aug 22, 2025
CVE-2025-38620
7.8

This is a use-after-free vulnerability in the Linux kernel's zoned loop device (zloop) driver that allows attackers with local access to potentially e...

Aug 22, 2025
CVE-2025-38618
7.8

A use-after-free vulnerability in the Linux kernel's vsock (virtual socket) subsystem allows local attackers to potentially escalate privileges or cra...

Aug 22, 2025
CVE-2025-38594
7.8

A use-after-free vulnerability in the Linux kernel's Intel IOMMU driver allows attackers with local access to potentially trigger kernel panics or ach...

Aug 19, 2025
CVE-2025-38596
7.8

This is a use-after-free vulnerability in the Linux kernel's panthor graphics driver debugfs code. It allows attackers with local access to potentiall...

Aug 19, 2025
CVE-2025-38598
7.8

This is a use-after-free vulnerability in the AMD GPU driver (amdgpu) in the Linux kernel that occurs during device suspend operations. When exploited...

Aug 19, 2025
CVE-2025-38584
7.8

A use-after-free vulnerability in the Linux kernel's padata subsystem allows local attackers to potentially crash the system or execute arbitrary code...

Aug 19, 2025
CVE-2025-38570
7.8

A use-after-free vulnerability in the Linux kernel's fbnic driver allows attackers to potentially crash systems or execute arbitrary code when AF_XDP ...

Aug 19, 2025
CVE-2025-38554
7.8

This is a use-after-free vulnerability in the Linux kernel's memory management subsystem that allows a local attacker to potentially crash the system ...

Aug 19, 2025
CVE-2025-38527
7.8

A race condition in the Linux kernel's SMB client can lead to use-after-free of memory structures during oplock break operations when unmounting. This...

Aug 16, 2025
CVE-2025-54230
7.8

Adobe Framemaker versions 2020.8, 2022.6 and earlier contain a use-after-free vulnerability that could allow arbitrary code execution when a user open...

Aug 12, 2025
CVE-2025-54232
7.8

Adobe Framemaker versions 2020.8, 2022.6 and earlier contain a use-after-free vulnerability that could allow arbitrary code execution when a user open...

Aug 12, 2025
CVE-2025-54224
7.8

Adobe InDesign versions 20.4, 19.5.4 and earlier contain a use-after-free vulnerability that could allow arbitrary code execution when a user opens a ...

Aug 12, 2025
CVE-2025-54226
7.8

Adobe InDesign has a use-after-free vulnerability that could allow attackers to execute arbitrary code when a user opens a malicious file. This affect...

Aug 12, 2025
CVE-2025-49561
7.8

Adobe Animate versions 23.0.12, 24.0.9 and earlier contain a use-after-free vulnerability that could allow attackers to execute arbitrary code on a vi...

Aug 12, 2025
CVE-2025-53735
7.8

This vulnerability is a use-after-free memory corruption flaw in Microsoft Office Excel that allows an attacker to execute arbitrary code on a victim'...

Aug 12, 2025

About Use After Free (CWE-416)

Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

Our database tracks 2,294 CVEs classified as CWE-416, with 175 rated critical and 1,964 rated high severity. The average CVSS score for Use After Free vulnerabilities is 8.0.

External reference: View CWE-416 on MITRE CWE →

Monitor Use After Free Vulnerabilities

Get alerted when new Use After Free CVEs affect your infrastructure.

Start Monitoring Free