CWE-416: Use After Free

Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

2,299
Total CVEs
178
Critical
1,966
High
8.0
Avg CVSS
10
In CISA KEV

Yearly Trend

2026
104
2025
719
2024
659
2023
248
2022
207

Top Affected Vendors

1 Linux 767
2 Google 386
3 Microsoft 259
4 Debian 225
5 Fedoraproject 193
6 Adobe 131
7 Foxit 84
8 Qualcomm 80
9 Apple 72
10 Mozilla 53

All Use After Free CVEs (2,299)

CVE-2025-27200
7.8

Adobe Animate versions 24.0.7, 23.0.10 and earlier contain a use-after-free vulnerability that could allow arbitrary code execution when a user opens ...

Apr 8, 2025
CVE-2025-21436
7.8

This CVE describes a use-after-free vulnerability in Qualcomm drivers where simultaneous IOCTL calls from different threads can cause memory corruptio...

Apr 7, 2025
CVE-2024-43066
7.8

This CVE describes a use-after-free vulnerability (CWE-416) in Qualcomm components that occurs during file descriptor handling in listener registratio...

Apr 7, 2025
CVE-2025-21999
7.8

This is a use-after-free vulnerability in the Linux kernel's proc filesystem that allows a race condition between module unloading and proc inode inst...

Apr 3, 2025
CVE-2025-22004
7.8

A use-after-free vulnerability in the Linux kernel's ATM (Asynchronous Transfer Mode) subsystem allows attackers to potentially crash the kernel or ex...

Apr 3, 2025
CVE-2025-21979
7.8

This is a use-after-free vulnerability in the Linux kernel's WiFi subsystem (cfg80211). When a wireless interface (wiphy) is freed before a scheduled ...

Apr 1, 2025
CVE-2025-21945
7.8

This CVE describes a use-after-free vulnerability in the Linux kernel's ksmbd (SMB server) component. When handling SMB2 lock operations with zero-len...

Apr 1, 2025
CVE-2025-21934
7.8

This CVE describes a use-after-free vulnerability in the Linux kernel's RapidIO subsystem. When rio_add_net() fails during device registration, improp...

Apr 1, 2025
CVE-2025-21923
7.8

A use-after-free vulnerability in the Linux kernel's HID steam driver allows attackers to potentially execute arbitrary code or cause system crashes w...

Apr 1, 2025
CVE-2025-21929
7.8

A use-after-free vulnerability in the Linux kernel's Intel ISHTP HID driver allows attackers to potentially crash the system or execute arbitrary code...

Apr 1, 2025
CVE-2025-21896
7.8

A use-after-free vulnerability in the Linux kernel's FUSE filesystem implementation allows attackers to potentially crash the kernel or execute arbitr...

Apr 1, 2025
CVE-2025-21893
7.8

This is a use-after-free vulnerability in the Linux kernel's key management subsystem. When a cryptographic key's reference count reaches zero, the ga...

Mar 31, 2025
CVE-2023-53021
7.8

A use-after-free vulnerability in the Linux kernel's taprio scheduler (sch_taprio) allows local attackers to cause a kernel crash or potentially execu...

Mar 27, 2025
CVE-2023-53023
7.8

A use-after-free vulnerability in the Linux kernel's NFC subsystem allows double-freeing of memory when detaching NFC devices while terminating the NF...

Mar 27, 2025
CVE-2023-53003
7.8

This CVE describes a use-after-free vulnerability in the Linux kernel's EDAC/qcom driver. When the qcom_edac driver is unloaded and reloaded, it attem...

Mar 27, 2025
CVE-2023-52999
7.8

This is a use-after-free vulnerability in the Linux kernel's network namespace operations registration error path. It allows attackers with local acce...

Mar 27, 2025
CVE-2023-52983
7.8

This is a use-after-free vulnerability in the Linux kernel's BFQ I/O scheduler that could allow local attackers to crash the system or potentially exe...

Mar 27, 2025
CVE-2023-52973
7.8

This is a use-after-free vulnerability in the Linux kernel's virtual console screen driver (vc_screen). It allows attackers with local access to poten...

Mar 27, 2025
CVE-2023-52974
7.8

A use-after-free vulnerability in the Linux kernel's iSCSI TCP module allows attackers to potentially crash the system or execute arbitrary code. This...

Mar 27, 2025
CVE-2023-52975
7.8

A use-after-free vulnerability in the Linux kernel's iSCSI TCP module allows local attackers to potentially crash the system or execute arbitrary code...

Mar 27, 2025
CVE-2023-52935
7.8

This is a race condition vulnerability in the Linux kernel's memory management subsystem (khugepaged) that can lead to use-after-free access. It affec...

Mar 27, 2025
CVE-2022-49761
7.8

This is a use-after-free vulnerability in the Linux kernel's Btrfs filesystem implementation. When run_one_delayed_ref() fails, it can trigger a use-a...

Mar 27, 2025
CVE-2022-49755
7.8

This is a use-after-free vulnerability in the Linux kernel's USB gadget function filesystem (FFS) driver. It allows local attackers to potentially cra...

Mar 27, 2025
CVE-2022-49753
7.8

A double increment bug in the Linux kernel's DMA engine causes incorrect client counting for DMA channels, leading to resource management issues. This...

Mar 27, 2025
CVE-2025-21867
7.8

A use-after-free vulnerability in the Linux kernel's BPF subsystem allows local attackers to cause memory corruption and potentially crash the system ...

Mar 27, 2025
CVE-2025-2532
7.8

This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious USDC files in Luxion KeyShot. Attackers ...

Mar 25, 2025
CVE-2025-0835
7.8

This vulnerability allows non-privileged software to make improper GPU system calls that corrupt kernel heap memory. It affects systems using Imaginat...

Mar 24, 2025
CVE-2023-52927
7.8

This Linux kernel vulnerability in the netfilter subsystem allows expectations (exp) to remain in hash tables when they should be removed, potentially...

Mar 14, 2025
CVE-2024-55549
7.8

CVE-2024-55549 is a use-after-free vulnerability in libxslt's xsltGetInheritedNsList function that occurs when excluding result prefixes. This allows ...

Mar 14, 2025
CVE-2025-24855
7.8

CVE-2025-24855 is a use-after-free vulnerability in libxslt's numbers.c that occurs during nested XPath evaluations when an XPath context node is modi...

Mar 14, 2025
CVE-2025-1432
7.8

A use-after-free vulnerability in Autodesk AutoCAD allows attackers to execute arbitrary code by tricking users into opening malicious 3DM files. This...

Mar 13, 2025
CVE-2025-21855
7.8

A use-after-free vulnerability in the Linux kernel's ibmvnic driver allows potential memory corruption when network packets are transmitted. This affe...

Mar 12, 2025
CVE-2025-21856
7.8

This CVE describes a use-after-free vulnerability in the Linux kernel's s390/ism driver where a struct device is freed without a proper release functi...

Mar 12, 2025
CVE-2025-21858
7.8

A use-after-free vulnerability in the Linux kernel's GENEVE (Generic Network Virtualization Encapsulation) implementation allows an attacker to cause ...

Mar 12, 2025
CVE-2025-2013
7.8

This is a use-after-free vulnerability in Ashlar-Vellum Cobalt's CO file parser that allows remote attackers to execute arbitrary code. Attackers can ...

Mar 11, 2025
CVE-2025-27181
7.8

CVE-2025-27181 is a use-after-free vulnerability in Substance3D Modeler that could allow arbitrary code execution when a user opens a malicious file. ...

Mar 11, 2025
CVE-2025-26630
7.8

A use-after-free vulnerability in Microsoft Office Access allows attackers to execute arbitrary code on vulnerable systems by tricking users into open...

Mar 11, 2025
CVE-2025-24082
7.8

A use-after-free vulnerability in Microsoft Office Excel allows attackers to execute arbitrary code on affected systems by tricking users into opening...

Mar 11, 2025
CVE-2025-24081
7.8

This vulnerability is a use-after-free memory corruption flaw in Microsoft Office Excel that allows an attacker to execute arbitrary code on a victim'...

Mar 11, 2025
CVE-2025-24079
7.8

A use-after-free vulnerability in Microsoft Office Word allows attackers to execute arbitrary code on vulnerable systems by tricking users into openin...

Mar 11, 2025
CVE-2025-24080
7.8

A use-after-free vulnerability in Microsoft Office allows an attacker to execute arbitrary code on a victim's system by tricking them into opening a m...

Mar 11, 2025
CVE-2025-24072
7.8

CVE-2025-24072 is a use-after-free vulnerability in Microsoft's Local Security Authority Server (lsasrv) that allows authenticated attackers to elevat...

Mar 11, 2025
CVE-2025-24077
7.8

A use-after-free vulnerability in Microsoft Office Word allows attackers to execute arbitrary code on affected systems by tricking users into opening ...

Mar 11, 2025
CVE-2025-24044
7.8

This is a use-after-free vulnerability in the Windows Win32 Kernel Subsystem that allows an authenticated attacker to execute arbitrary code with elev...

Mar 11, 2025
CVE-2025-24046
7.8

CVE-2025-24046 is a use-after-free vulnerability in Microsoft Streaming Service that allows an authenticated attacker to execute arbitrary code with e...

Mar 11, 2025
CVE-2024-12837
7.8

This vulnerability allows non-privileged software to make improper GPU system calls that corrupt kernel heap memory, potentially leading to system com...

Mar 7, 2025
CVE-2024-58083
7.8

This vulnerability in the Linux kernel's KVM subsystem allows a malicious user or guest VM to potentially trigger a use-after-free condition by access...

Mar 6, 2025
CVE-2024-58072
7.8

This CVE describes a use-after-free vulnerability in the Linux kernel's rtlwifi driver. When a WiFi device probe fails, private data structures aren't...

Mar 6, 2025
CVE-2024-58060
7.8

A use-after-free vulnerability in the Linux kernel's BPF subsystem allows attackers to cause memory corruption when registering struct_ops with module...

Mar 6, 2025
CVE-2025-21424
7.8

This CVE describes a use-after-free vulnerability (CWE-416) in Qualcomm NPU driver APIs that can be triggered through concurrent calls, leading to mem...

Mar 3, 2025

About Use After Free (CWE-416)

Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

Our database tracks 2,299 CVEs classified as CWE-416, with 178 rated critical and 1,966 rated high severity. The average CVSS score for Use After Free vulnerabilities is 8.0.

External reference: View CWE-416 on MITRE CWE →

Monitor Use After Free Vulnerabilities

Get alerted when new Use After Free CVEs affect your infrastructure.

Start Monitoring Free