CWE-416: Use After Free
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Yearly Trend
Top Affected Vendors
All Use After Free CVEs (2,296)
This vulnerability allows attackers to cause memory corruption through a race condition in concurrent SSR execution on Qualcomm devices. It affects sy...
May 6, 2025This is a use-after-free vulnerability in the Linux kernel's CAIF USB driver that allows local attackers to potentially crash the system or execute ar...
May 2, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's PCI subsystem on s390 architecture systems. When PCI functions are individuall...
May 2, 2025A use-after-free vulnerability in the Linux kernel's loop device subsystem allows local attackers to cause kernel crashes or potentially execute arbit...
May 2, 2025This is a use-after-free vulnerability in the Linux kernel's NVMe over Fabrics target subsystem. An attacker could potentially exploit this to cause k...
May 2, 2025A use-after-free vulnerability in the Linux kernel's NFC (Near Field Communication) subsystem allows attackers to potentially execute arbitrary code o...
May 2, 2025This is a use-after-free vulnerability in the Linux kernel's DRM subsystem that occurs when the drm_gem_shmem_mmap() function incorrectly releases a r...
May 2, 2025This is a use-after-free vulnerability in the Linux kernel's MPTCP implementation that occurs during listener shutdown. Attackers could potentially ex...
May 2, 2025This is a use-after-free vulnerability in the Linux kernel's MPTCP implementation that allows local attackers to potentially execute arbitrary code or...
May 2, 2025This is a use-after-free vulnerability in the Linux kernel's ftrace subsystem that allows local attackers to potentially execute arbitrary code or cau...
May 2, 2025This is a use-after-free vulnerability in the Linux kernel's CIFS (Common Internet File System) implementation, specifically in the DFS cache refresh ...
May 2, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's Intel ISH HID driver. When the driver's probe function fails during device ini...
May 2, 2025A use-after-free vulnerability in the Linux kernel's mpi3mr SCSI driver can cause kernel crashes when handling faulty storage devices. Attackers could...
May 2, 2025This CVE describes a Use-After-Free vulnerability in the Linux kernel's HFSC (Hierarchical Fair Service Curve) queuing discipline scheduler. The vulne...
May 2, 2025A Use After Free vulnerability in Arm GPU kernel drivers allows local non-privileged users to access freed memory through GPU processing operations. T...
May 2, 2025This is a use-after-free vulnerability in the Linux kernel's network scheduler (specifically the red_enqueue() function). Attackers could potentially ...
May 1, 2025This is a use-after-free vulnerability in the Linux kernel's Bluetooth L2CAP implementation that allows local attackers to potentially crash the syste...
May 1, 2025A use-after-free vulnerability in the Linux kernel's ftrace subsystem allows an attacker to cause memory corruption when multiple dynamic ftrace_ops w...
May 1, 2025This CVE-2022-49882 is a use-after-free vulnerability in the Linux kernel's KVM subsystem that allows a local attacker to cause a kernel crash or pote...
May 1, 2025This is a use-after-free vulnerability in the Linux kernel's BPF subsystem that occurs when bpf_prog_test_run_skb() receives odd-sized data from user ...
May 1, 2025A use-after-free vulnerability in the Linux kernel's ASoC (ALSA System on Chip) subsystem allows local attackers to potentially crash the kernel or ex...
May 1, 2025A use-after-free vulnerability in the Linux kernel's nilfs2 filesystem driver allows local attackers to potentially crash the system or execute arbitr...
May 1, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's DRBD (Distributed Replicated Block Device) subsystem. The flaw occurs in drbd_...
May 1, 2025This Linux kernel vulnerability involves improper handling of kprobes (kernel probes) when unregistering ftrace-based probes, potentially causing use-...
May 1, 2025This is a use-after-free vulnerability in the Linux kernel's NTFS filesystem driver. It allows attackers to trigger kernel memory corruption by mounti...
May 1, 2025A use-after-free vulnerability in the Linux kernel's Ceph filesystem component could allow local attackers to cause kernel crashes or potentially exec...
May 1, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's at76c50x USB WiFi driver. When a device disconnects, the driver accesses freed...
May 1, 2025This CVE describes a use-after-free vulnerability in the Imagination GPU driver for the Linux kernel. When paired geometry and fragment jobs are proce...
May 1, 2025A use-after-free vulnerability in the Linux kernel's ext4 filesystem allows attackers to cause memory corruption when processing extended attributes. ...
May 1, 2025A use-after-free vulnerability in the Linux kernel's SCTP implementation allows a race condition where a transport structure can be accessed after bei...
May 1, 2025A use-after-free vulnerability in the Linux kernel's ssi_protocol driver allows local attackers to potentially crash the system or execute arbitrary c...
Apr 18, 2025This is a use-after-free vulnerability in the Linux kernel's CAN (Controller Area Network) subsystem. When exploited, it allows local attackers to cau...
Apr 17, 2025This is a use-after-free vulnerability in the Linux kernel's CAN bus subsystem for PEAK USB devices. It allows attackers with local access to potentia...
Apr 17, 2025This CVE describes a use-after-free (UAF) vulnerability in the Linux kernel's MD (Multiple Device) subsystem. The race condition occurs when iterating...
Apr 16, 2025This CVE describes a use-after-free and double-free vulnerability in the Linux kernel's vkms (Virtual Kernel Mode Setting) driver. If driver initializ...
Apr 16, 2025A use-after-free vulnerability in the Linux kernel's vhost-scsi subsystem allows attackers to cause denial of service, system crashes, or potentially ...
Apr 16, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's RDMA (Remote Direct Memory Access) subsystem. When renaming an RDMA device nam...
Apr 16, 2025A use-after-free vulnerability in the Linux kernel's tracing subsystem allows local attackers to potentially crash the system or execute arbitrary cod...
Apr 16, 2025A use-after-free vulnerability in the Linux kernel's ksmbd (SMB server) component allows attackers to potentially crash systems or execute arbitrary c...
Apr 16, 2025A use-after-free vulnerability in the Linux kernel's PCI/ASPM subsystem that can cause kernel crashes or potential privilege escalation when PCIe devi...
Apr 16, 2025This is a use-after-free vulnerability in the Linux kernel's rtsx_usb_ms driver for Realtek memory card readers. It allows attackers with local access...
Apr 16, 2025This is a local privilege escalation vulnerability in the Windows Common Log File System Driver. An authenticated attacker can exploit a use-after-fre...
Apr 8, 2025A use-after-free vulnerability in Microsoft Office Word allows attackers to execute arbitrary code on vulnerable systems by tricking users into openin...
Apr 8, 2025A use-after-free vulnerability in Microsoft Office allows attackers to execute arbitrary code on vulnerable systems by tricking users into opening mal...
Apr 8, 2025A use-after-free vulnerability in Microsoft Office Excel allows attackers to execute arbitrary code on a victim's system by tricking them into opening...
Apr 8, 2025CVE-2025-27745 is a use-after-free vulnerability in Microsoft Office that allows local attackers to execute arbitrary code on affected systems. This a...
Apr 8, 2025This vulnerability allows an authorized attacker to exploit a use-after-free flaw in Windows Digital Media components to elevate privileges locally. I...
Apr 8, 2025Adobe Animate versions 24.0.7, 23.0.10 and earlier contain a use-after-free vulnerability that could allow arbitrary code execution when a user opens ...
Apr 8, 2025This CVE describes a use-after-free vulnerability in Qualcomm drivers where simultaneous IOCTL calls from different threads can cause memory corruptio...
Apr 7, 2025This CVE describes a use-after-free vulnerability (CWE-416) in Qualcomm components that occurs during file descriptor handling in listener registratio...
Apr 7, 2025About Use After Free (CWE-416)
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Our database tracks 2,296 CVEs classified as CWE-416, with 176 rated critical and 1,965 rated high severity. The average CVSS score for Use After Free vulnerabilities is 8.0.
External reference: View CWE-416 on MITRE CWE →
Monitor Use After Free Vulnerabilities
Get alerted when new Use After Free CVEs affect your infrastructure.
Start Monitoring Free