CWE-416: Use After Free
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Yearly Trend
Top Affected Vendors
All Use After Free CVEs (2,295)
This is a use-after-free vulnerability in the Linux kernel's SPI driver for NVIDIA Tegra processors. An attacker with local access can trigger memory ...
Jun 18, 2025This is a use-after-free vulnerability in the Linux kernel's ath9k wireless driver that allows attackers to potentially execute arbitrary code or caus...
Jun 18, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's RDMA subsystem (irdma driver). An attacker could potentially exploit this to c...
Jun 18, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's RDMA/srpt subsystem. An attacker could potentially exploit this to cause kerne...
Jun 18, 2025A use-after-free vulnerability in the Linux kernel's posix-cpu-timers subsystem allows local attackers to potentially escalate privileges or cause den...
Jun 18, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's ARM SCPI firmware driver. If exploited, it could allow local attackers to exec...
Jun 18, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's NFSv4/pnfs implementation. When an open RPC call is cancelled, the kernel inco...
Jun 18, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's virtio-blk driver that occurs during system suspend/resume cycles. When a virt...
Jun 18, 2025This is a use-after-free vulnerability in the Linux kernel's USB CDNS3 gadget driver. An attacker could exploit this to cause a kernel crash (denial o...
Jun 18, 2025A use-after-free vulnerability in the Linux kernel's ext4 filesystem allows attackers to trigger a kernel panic (system crash) by exploiting corrupted...
Jun 18, 2025A use-after-free vulnerability in the Linux kernel's NFC subsystem allows attackers to potentially crash the kernel or execute arbitrary code when spe...
Jun 18, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's writeback subsystem when a storage device is removed. Attackers could potentia...
Jun 18, 2025A race condition in the Linux kernel's USB gadget subsystem allows a use-after-free vulnerability when processing uevent notifications. This can lead ...
Jun 18, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's rtl8712 staging driver. When Read/Write_MACREG callbacks are NULL, the read/wr...
Jun 18, 2025A use-after-free vulnerability in the Linux kernel's DMA buffer reservation system allows attackers with local access to potentially execute arbitrary...
Jun 18, 2025A use-after-free vulnerability in the Linux kernel's memory allocation tagging system allows attackers to potentially execute arbitrary code or cause ...
Jun 18, 2025A use-after-free vulnerability in the Linux kernel's Sound Open Firmware (SOF) Intel HDA driver allows attackers to potentially crash the system or ex...
Jun 18, 2025A use-after-free vulnerability in the Linux kernel's RDMA over Converged Ethernet (RoCE) implementation allows reading freed memory when creating comp...
Jun 18, 2025A use-after-free vulnerability in the Linux kernel's mlxsw driver allows local attackers to cause kernel memory corruption when deleting GRE network d...
Jun 18, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's RDMA subsystem that occurs when renaming InfiniBand device names. The vulnerab...
Jun 18, 2025A use-after-free vulnerability in Adobe Acrobat Reader allows arbitrary code execution when a user opens a malicious PDF file. This affects users runn...
Jun 10, 2025A use-after-free vulnerability in Adobe Acrobat Reader allows arbitrary code execution when a user opens a malicious PDF file. This affects users runn...
Jun 10, 2025This vulnerability is a use-after-free flaw in Microsoft Office Word that allows an unauthorized attacker to execute arbitrary code on a victim's syst...
Jun 10, 2025A use-after-free vulnerability in Microsoft Office Word allows attackers to execute arbitrary code on a victim's system by tricking them into opening ...
Jun 10, 2025Adobe InDesign has a use-after-free vulnerability that allows arbitrary code execution when a user opens a malicious file. This affects users running ...
Jun 10, 2025CVE-2025-32712 is a use-after-free vulnerability in Windows Win32K graphics subsystem that allows authenticated attackers to execute arbitrary code wi...
Jun 10, 2025A race condition in the Linux kernel's HFSC (Hierarchical Fair Service Curve) queuing discipline can cause inconsistent queue accounting when packets ...
Jun 6, 2025A maliciously crafted RFA file can trigger a Use-After-Free vulnerability in Autodesk Revit, allowing attackers to crash the application, read sensiti...
Jun 2, 2025A Use After Free vulnerability in Arm's Valhall and 5th Gen GPU kernel drivers allows a local non-privileged user to access freed memory through impro...
Jun 2, 2025CVE-2025-44906 is a heap-use-after-free vulnerability in jhead v3.08's ProcessFile function that could allow attackers to execute arbitrary code or ca...
May 30, 2025A Linux kernel vulnerability in KVM's SVM (Secure Virtual Machine) implementation where a triple fault occurring while a vCPU is in System Management ...
May 20, 2025A use-after-free vulnerability in the Linux kernel's ksmbd module allows attackers to potentially crash the kernel or execute arbitrary code. This aff...
May 20, 2025A double-free vulnerability in the Linux kernel's s390 PCI subsystem could lead to use-after-free conditions when disabling PCI slots with child virtu...
May 20, 2025A use-after-free vulnerability in the Linux kernel's ksmbd component allows attackers to potentially crash systems or execute arbitrary code. This aff...
May 20, 2025A use-after-free vulnerability in the Linux kernel's ksmbd SMB server allows an attacker to potentially crash the kernel or execute arbitrary code. Th...
May 20, 2025A use-after-free vulnerability in the Linux kernel's AMD GPU display driver allows attackers to cause memory corruption when USB-C docks are unplugged...
May 20, 2025CVE-2025-43571 is a use-after-free vulnerability in Substance3D Stager that could allow arbitrary code execution when a user opens a malicious file. T...
May 13, 2025A null pointer dereference vulnerability in Windows Ancillary Function Driver for WinSock allows authenticated attackers to execute arbitrary code wit...
May 13, 2025This vulnerability is a use-after-free memory corruption flaw in Microsoft Office Excel that allows an attacker to execute arbitrary code on a victim'...
May 13, 2025This vulnerability is a use-after-free flaw in the Windows Common Log File System Driver that allows an authenticated attacker to execute arbitrary co...
May 13, 2025A use-after-free vulnerability in Microsoft Office Excel allows attackers to execute arbitrary code on a victim's system by tricking them into opening...
May 13, 2025A race condition vulnerability in the Linux kernel's mpi3mr SCSI driver allows concurrent access between reset and task management threads, leading to...
May 9, 2025A use-after-free vulnerability in the Linux kernel's AMDKFD driver allows local attackers to cause denial of service or potentially execute arbitrary ...
May 9, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's fprobe tracing subsystem. An attacker could exploit this to cause kernel crash...
May 9, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's KVM (Kernel-based Virtual Machine) subsystem for ARM64 architecture. When vCPU...
May 9, 2025A use-after-free vulnerability in the Linux kernel's GIC-V2M interrupt controller allows attackers to cause kernel panics or potentially execute arbit...
May 8, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's HFSC (Hierarchical Fair Service Curve) network scheduler. An attacker could po...
May 8, 2025CVE-2024-45564 is a use-after-free vulnerability in Qualcomm server components where concurrent access to server info objects can cause memory corrupt...
May 6, 2025This CVE describes a use-after-free vulnerability in Qualcomm components where concurrent buffer access leads to memory corruption when reference coun...
May 6, 2025This vulnerability allows attackers to cause memory corruption through a race condition in concurrent SSR execution on Qualcomm devices. It affects sy...
May 6, 2025About Use After Free (CWE-416)
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Our database tracks 2,295 CVEs classified as CWE-416, with 175 rated critical and 1,965 rated high severity. The average CVSS score for Use After Free vulnerabilities is 8.0.
External reference: View CWE-416 on MITRE CWE →
Monitor Use After Free Vulnerabilities
Get alerted when new Use After Free CVEs affect your infrastructure.
Start Monitoring Free