CWE-416: Use After Free

Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

2,308
Total CVEs
181
Critical
1,972
High
8.0
Avg CVSS
10
In CISA KEV

Yearly Trend

2026
104
2025
719
2024
659
2023
248
2022
207

Top Affected Vendors

1 Linux 767
2 Google 387
3 Microsoft 259
4 Debian 227
5 Fedoraproject 194
6 Adobe 131
7 Foxit 84
8 Qualcomm 83
9 Apple 75
10 Mozilla 53

All Use After Free CVEs (2,308)

CVE-2022-49047
7.8

This CVE describes a use-after-free vulnerability in the Linux kernel's ep93xx clock driver. An attacker could potentially exploit this to cause kerne...

Feb 26, 2025
CVE-2021-47653
7.8

This CVE describes a use-after-free vulnerability in the Linux kernel's davinci vpif media driver. When the driver is unbound (removed), it fails to p...

Feb 26, 2025
CVE-2021-47646
7.8

This CVE involves a use-after-free vulnerability in the Linux kernel's BFQ I/O scheduler that could lead to system crashes or potential privilege esca...

Feb 26, 2025
CVE-2021-47634
7.8

This is a use-after-free vulnerability in the Linux kernel's UBI (Unsorted Block Images) subsystem caused by a race condition between device control a...

Feb 26, 2025
CVE-2021-47639
7.8

A use-after-free vulnerability in the Linux kernel's KVM hypervisor TDP MMU component allows attackers to potentially crash the host system or execute...

Feb 26, 2025
CVE-2025-26600
7.8

A use-after-free vulnerability in X.Org and Xwayland allows attackers to potentially execute arbitrary code or cause denial of service when a device i...

Feb 25, 2025
CVE-2025-26601
7.8

A use-after-free vulnerability in X.Org and Xwayland allows attackers to potentially execute arbitrary code or cause denial of service. This affects s...

Feb 25, 2025
CVE-2025-26594
7.8

A use-after-free vulnerability in X.Org and Xwayland allows attackers to potentially crash the X server or execute arbitrary code by freeing the root ...

Feb 25, 2025
CVE-2025-21703
7.8

This is a use-after-free vulnerability in the Linux kernel's netem network emulation subsystem. It allows attackers with local access to potentially c...

Feb 18, 2025
CVE-2025-21700
7.8

This Linux kernel vulnerability allows a local attacker to trigger a use-after-free condition in the traffic control subsystem by manipulating qdisc c...

Feb 13, 2025
CVE-2024-57951
7.8

A Linux kernel vulnerability in the hrtimers subsystem allows improper handling of CPU state during hotplug operations. This can lead to system instab...

Feb 12, 2025
CVE-2025-21394
7.8

This vulnerability allows remote code execution through specially crafted Excel files. Attackers could exploit this to execute arbitrary code on a vic...

Feb 11, 2025
CVE-2025-21397
7.8

This vulnerability allows remote code execution through specially crafted Microsoft Office documents. Attackers can exploit this by tricking users int...

Feb 11, 2025
CVE-2025-21387
7.8

This vulnerability allows remote attackers to execute arbitrary code on affected systems by tricking users into opening a specially crafted Excel file...

Feb 11, 2025
CVE-2025-21367
7.8

This is a Windows kernel privilege escalation vulnerability in the Win32 subsystem that allows attackers to gain SYSTEM-level privileges on affected s...

Feb 11, 2025
CVE-2025-21159
7.8

Adobe Illustrator versions 29.1, 28.7.3 and earlier contain a use-after-free vulnerability that could allow attackers to execute arbitrary code when a...

Feb 11, 2025
CVE-2025-21693
7.8

A use-after-free vulnerability in the Linux kernel's zswap memory compression subsystem allows local attackers to potentially crash the system or exec...

Feb 10, 2025
CVE-2025-0015
7.8

A Use After Free vulnerability in Arm's Valhall and 5th Gen GPU kernel drivers allows local non-privileged users to access freed memory through improp...

Feb 3, 2025
CVE-2025-21671
7.8

This CVE describes a use-after-free vulnerability in the Linux kernel's zram compressed memory driver. If zram device initialization fails, the kernel...

Jan 31, 2025
CVE-2024-47891
7.8

This vulnerability allows non-privileged software to make improper GPU system calls that trigger use-after-free kernel exceptions. It affects systems ...

Jan 31, 2025
CVE-2024-47898
7.8

This vulnerability allows non-privileged software to make improper GPU system calls that trigger use-after-free kernel exceptions. It affects systems ...

Jan 31, 2025
CVE-2024-47899
7.8

This vulnerability allows non-privileged software to make improper GPU system calls that trigger use-after-free kernel exceptions. This affects system...

Jan 31, 2025
CVE-2024-57926
7.8

A use-after-free vulnerability in the Linux kernel's MediaTek DRM driver allows local attackers to cause kernel memory corruption during system shutdo...

Jan 19, 2025
CVE-2025-21652
7.8

A use-after-free vulnerability in the Linux kernel's ipvlan network driver allows attackers to potentially crash the kernel or execute arbitrary code....

Jan 19, 2025
CVE-2025-21631
7.8

This is a use-after-free (UAF) vulnerability in the Linux kernel's BFQ I/O scheduler. It allows attackers with local access to potentially escalate pr...

Jan 19, 2025
CVE-2024-57795
7.8

A use-after-free vulnerability in the Linux kernel's RDMA over Converged Ethernet (RXE) driver allows attackers to potentially crash the kernel or exe...

Jan 15, 2025
CVE-2024-57801
7.8

A use-after-free vulnerability in the Linux kernel's mlx5e network driver allows attackers to potentially crash the kernel or execute arbitrary code. ...

Jan 15, 2025
CVE-2025-21366
7.8

This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of Microsoft Access. Attackers could explo...

Jan 14, 2025
CVE-2025-21372
7.8

This vulnerability in Microsoft Brokering File System allows attackers to escalate privileges on affected Windows systems. An authenticated attacker c...

Jan 14, 2025
CVE-2025-21345
7.8

This vulnerability in Microsoft Office Visio allows attackers to execute arbitrary code by tricking users into opening specially crafted files. It aff...

Jan 14, 2025
CVE-2025-21334
KEV 7.8

This vulnerability allows an authenticated attacker with local access to a Windows Hyper-V host to escalate privileges by exploiting a use-after-free ...

Jan 14, 2025
CVE-2025-21335
KEV 7.8

This vulnerability allows an authenticated attacker with guest VM access to execute arbitrary code with SYSTEM privileges on the Hyper-V host. It affe...

Jan 14, 2025
CVE-2025-21315
7.8

This is an elevation of privilege vulnerability in Microsoft's Brokering File System component. It allows authenticated attackers to gain SYSTEM-level...

Jan 14, 2025
CVE-2025-21304
7.8

This is a use-after-free vulnerability in Microsoft's Desktop Window Manager (DWM) Core Library that allows local attackers to execute arbitrary code ...

Jan 14, 2025
CVE-2025-21281
7.8

This vulnerability in Microsoft COM for Windows allows attackers to gain elevated privileges on affected systems. It affects Windows systems where an ...

Jan 14, 2025
CVE-2024-57849
7.8

A use-after-free vulnerability in the Linux kernel's s390 CPU Measurement Facility (CPUMF) sampling component allows reading from already freed memory...

Jan 11, 2025
CVE-2024-57798
7.8

This is a use-after-free vulnerability in the Linux kernel's DisplayPort Multi-Stream Transport (DP-MST) subsystem. It allows a local attacker to caus...

Jan 11, 2025
CVE-2024-50051
7.8

This CVE describes a use-after-free vulnerability in the Linux kernel's mpc52xx SPI driver. When removing the driver module, the system fails to prope...

Jan 11, 2025
CVE-2024-41149
7.8

This Linux kernel vulnerability involves a use-after-free condition in the block layer's hardware context (hctx) management during CPU hotplug operati...

Jan 11, 2025
CVE-2024-56772
7.8

This CVE describes a use-after-free vulnerability in the Linux kernel's KUnit testing framework. When alloc_string_stream() fails during test suite in...

Jan 8, 2025
CVE-2023-35685
7.8

CVE-2023-35685 is a use-after-free vulnerability in the Android kernel's device memory management that allows local attackers to escalate privileges w...

Jan 8, 2025
CVE-2024-56764
7.8

A use-after-free vulnerability in the Linux kernel's ublk subsystem allows attackers to potentially crash the kernel or execute arbitrary code with ke...

Jan 6, 2025
CVE-2024-56765
7.8

A use-after-free vulnerability in the Linux kernel's PowerPC pSeries VAS (Virtual Accelerator Switchboard) subsystem allows local attackers to cause m...

Jan 6, 2025
CVE-2024-56759
7.8

A use-after-free vulnerability in the Linux kernel's Btrfs filesystem occurs when Copy-On-Write (COW) operations on tree blocks are performed with tra...

Jan 6, 2025
CVE-2024-45553
7.8

This CVE describes a use-after-free vulnerability in Qualcomm components where memory corruption can occur when process-specific maps are improperly h...

Jan 6, 2025
CVE-2024-56693
7.8

This CVE describes a use-after-free vulnerability in the Linux kernel's brd (block RAM disk) module that occurs during module initialization failure. ...

Dec 28, 2024
CVE-2024-56678
7.8

A Linux kernel vulnerability in powerpc/mm/fault allows improper handling of page faults when reading /proc/kcore, potentially causing false KFENCE er...

Dec 28, 2024
CVE-2024-46973
7.8

This vulnerability allows non-privileged users to trigger use-after-free kernel exceptions through improper GPU system calls, potentially leading to p...

Dec 28, 2024
CVE-2024-56675
7.8

This CVE describes a use-after-free vulnerability in the Linux kernel's BPF subsystem where uprobes use tasks-trace-RCU protection while non-sleepable...

Dec 27, 2024
CVE-2024-56652
7.8

This CVE describes a use-after-free vulnerability in the Linux kernel's Xe graphics driver register save/restore functionality. When the kernel reallo...

Dec 27, 2024

About Use After Free (CWE-416)

Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

Our database tracks 2,308 CVEs classified as CWE-416, with 181 rated critical and 1,972 rated high severity. The average CVSS score for Use After Free vulnerabilities is 8.0.

External reference: View CWE-416 on MITRE CWE →

Monitor Use After Free Vulnerabilities

Get alerted when new Use After Free CVEs affect your infrastructure.

Start Monitoring Free