CWE-416: Use After Free
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Yearly Trend
Top Affected Vendors
All Use After Free CVEs (2,294)
A use-after-free vulnerability in Desktop Windows Manager allows authenticated attackers to execute arbitrary code locally on vulnerable Windows syste...
Aug 12, 2025A use-after-free vulnerability in the Linux kernel's xfrm interface subsystem allows local attackers to cause a kernel panic (denial of service) or po...
Aug 12, 2025This vulnerability allows attackers to cause memory corruption by simultaneously calling IOCTL interface functions to map and unmap buffers. It affect...
Aug 6, 2025This vulnerability allows memory corruption when multiple threads concurrently call IOCTL commands to map/unmap buffers in Qualcomm drivers. Attackers...
Aug 6, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's SMB client when using hardware crypto accelerators. The vulnerability can caus...
Jul 28, 2025This is a use-after-free vulnerability in the Linux kernel's RPL (Routing Protocol for Low-Power and Lossy Networks) implementation. An attacker could...
Jul 28, 2025A use-after-free vulnerability in the Linux kernel's TLS implementation allows reading freed memory when processing network packets. This affects syst...
Jul 28, 2025A use-after-free vulnerability in the Linux kernel's TIPC (Transparent Inter-Process Communication) subsystem allows local attackers to cause a kernel...
Jul 25, 2025A use-after-free vulnerability in the Linux kernel's ksmbd (SMB server) component could allow attackers to crash the kernel or potentially execute arb...
Jul 25, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's NBD (Network Block Device) driver. When nbd_genl_connect() encounters certain ...
Jul 25, 2025A use-after-free vulnerability in the Linux kernel's ROSE protocol implementation allows attackers to potentially crash systems or execute arbitrary c...
Jul 25, 2025A use-after-free vulnerability in the Linux kernel's IDXD DMA engine driver can cause kernel panics or system crashes when containers with specific mo...
Jul 25, 2025A use-after-free vulnerability in the Linux kernel's network traffic control subsystem allows local attackers to potentially crash the system or execu...
Jul 19, 2025A use-after-free vulnerability in the Linux kernel's eventpoll (epoll) subsystem allows local attackers to potentially escalate privileges or crash th...
Jul 18, 2025A Use After Free vulnerability in SOLIDWORKS eDrawings allows attackers to execute arbitrary code when users open malicious IPT files. This affects us...
Jul 15, 2025A Use After Free vulnerability in SOLIDWORKS eDrawings allows attackers to execute arbitrary code when users open malicious JT files. This affects SOL...
Jul 15, 2025A Use After Free vulnerability in SOLIDWORKS eDrawings allows attackers to execute arbitrary code when users open malicious CATPRODUCT files. This aff...
Jul 15, 2025This is a use-after-free vulnerability in the Linux kernel's ftrace subsystem that occurs when kallsyms looks up module symbols after ftrace has been ...
Jul 10, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's ATM (Asynchronous Transfer Mode) LAN Emulation (LANE) subsystem. The vulnerabi...
Jul 10, 2025This CVE describes a memory leak and resource management vulnerability in the Linux kernel's WCD9335 audio codec driver. The driver fails to properly ...
Jul 9, 2025A use-after-free vulnerability in the Linux kernel's Bluetooth subsystem allows an attacker to cause memory corruption when multiple threads access a ...
Jul 9, 2025A use-after-free vulnerability in the Linux kernel's bridge multicast implementation allows attackers to potentially crash the kernel or execute arbit...
Jul 9, 2025A use-after-free vulnerability in Windows Notification allows authenticated attackers to execute arbitrary code with elevated privileges. This affects...
Jul 8, 2025A use-after-free vulnerability in Microsoft Office Excel allows attackers to execute arbitrary code on a victim's system by tricking them into opening...
Jul 8, 2025This vulnerability is a use-after-free flaw in Microsoft Office Word that allows an attacker to execute arbitrary code on a victim's system by trickin...
Jul 8, 2025A use-after-free vulnerability in Microsoft Office Word allows attackers to execute arbitrary code on affected systems by tricking users into opening ...
Jul 8, 2025A use-after-free vulnerability in Windows SSDP Service allows authenticated attackers to execute arbitrary code with elevated SYSTEM privileges. This ...
Jul 8, 2025This CVE describes a use-after-free vulnerability (CWE-416) in Qualcomm components where abrupt client process termination during event handling cause...
Jul 8, 2025This CVE describes a use-after-free vulnerability (CWE-416) in Qualcomm sub-system restart processes that can lead to memory corruption. Attackers cou...
Jul 8, 2025This vulnerability allows memory corruption when processing a private escape command in an event trigger, potentially leading to arbitrary code execut...
Jul 8, 2025A use-after-free vulnerability in the Linux kernel's AF_UNIX socket implementation allows local attackers to potentially execute arbitrary code or cra...
Jul 8, 2025A use-after-free vulnerability in the Linux kernel's NVMe over TCP implementation allows attackers to cause kernel memory corruption and potentially c...
Jul 4, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's RDMA/iwcm subsystem where work objects allocated for connection management IDs...
Jul 4, 2025A use-after-free vulnerability in the Linux kernel's Nouveau GPU driver allows attackers to potentially crash the system or execute arbitrary code. Th...
Jul 4, 2025This is a use-after-free vulnerability in the Linux kernel's binder subsystem where a device can be freed from memory while still referenced in the bi...
Jul 4, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's EROFS filesystem driver. When mounting an EROFS filesystem with multiple devic...
Jul 3, 2025A use-after-free vulnerability in the Linux kernel's PCI power control subsystem allows attackers to potentially crash the system or execute arbitrary...
Jul 3, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's device mapper (dm) subsystem when handling zoned block devices. It allows a lo...
Jul 3, 2025A use-after-free vulnerability in the Linux kernel's page pool subsystem allows an attacker to cause memory corruption when recycling network pages. T...
Jul 3, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's CoreSight subsystem where race conditions between configuration activation/dea...
Jul 3, 2025A use-after-free vulnerability in the Linux kernel's ath12k WiFi driver allows local attackers to potentially crash the kernel or execute arbitrary co...
Jul 3, 2025This is a use-after-free vulnerability in the Linux kernel's Bluetooth management subsystem. It allows attackers with local access to potentially cras...
Jul 3, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's io_uring subsystem. When the __io_uring_show_fdinfo() function accesses freed ...
Jul 3, 2025A use-after-free vulnerability in the Linux kernel's network scheduler (taprio) allows attackers to potentially crash the kernel or execute arbitrary ...
Jun 30, 2025A use-after-free vulnerability in PDF-XChange Editor allows remote attackers to execute arbitrary code when users open malicious PDF files or visit ma...
Jun 25, 2025CVE-2025-6640 is a use-after-free vulnerability in PDF-XChange Editor's U3D file parsing that allows remote attackers to execute arbitrary code when u...
Jun 25, 2025A use-after-free vulnerability in PDF-XChange Editor's U3D file parsing allows remote attackers to execute arbitrary code when users open malicious PD...
Jun 25, 2025This is a use-after-free vulnerability in the Linux kernel's ALSA bcd2000 driver that occurs during device probe failure. When the driver fails to reg...
Jun 18, 2025A use-after-free vulnerability in the Linux kernel's netfilter nf_tables subsystem allows local attackers to potentially escalate privileges or crash ...
Jun 18, 2025A use-after-free vulnerability in the Linux kernel's BPF subsystem allows attackers to trigger memory corruption when BPF links are detached under spe...
Jun 18, 2025About Use After Free (CWE-416)
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Our database tracks 2,294 CVEs classified as CWE-416, with 175 rated critical and 1,964 rated high severity. The average CVSS score for Use After Free vulnerabilities is 8.0.
External reference: View CWE-416 on MITRE CWE →
Monitor Use After Free Vulnerabilities
Get alerted when new Use After Free CVEs affect your infrastructure.
Start Monitoring Free