CWE-416: Use After Free
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Yearly Trend
Top Affected Vendors
All Use After Free CVEs (2,308)
This CVE describes a use-after-free vulnerability in the Linux kernel's RAVB Ethernet driver. An attacker could potentially exploit this to cause kern...
Oct 21, 2024This CVE describes a use-after-free vulnerability in the Linux kernel's Hisilicon network driver. An attacker could potentially exploit this to crash ...
Oct 21, 2024This is a use-after-free vulnerability in the Linux kernel's performance monitoring subsystem (perf). It allows attackers with local access to trigger...
Oct 21, 2024This is a use-after-free vulnerability in the Linux kernel's s390/qeth driver that occurs during bridge-to-device event handling. An attacker could po...
Oct 21, 2024This is a use-after-free vulnerability in the Linux kernel's IPv6 fragmentation code that can lead to kernel memory corruption and potential privilege...
Oct 21, 2024This CVE describes a race condition vulnerability in the Linux kernel's IEEE 802.15.4 (WPAN) subsystem where improper RCU (Read-Copy-Update) handling ...
Oct 21, 2024This CVE describes a use-after-free vulnerability in the Linux kernel's x86-android-tablets driver. When platform_device_register() fails during devic...
Oct 21, 2024This CVE describes a use-after-free vulnerability in the AMDKFD (AMD Kernel Fusion Driver) component of the Linux kernel. An attacker with local acces...
Oct 21, 2024A use-after-free vulnerability in the Linux kernel's ext4 filesystem driver occurs when mounting fails, allowing a timer to remain active after memory...
Oct 21, 2024This CVE describes a use-after-free vulnerability in the Linux kernel's OCFS2 filesystem quota handling. When an error occurs during global quota read...
Oct 21, 2024A use-after-free vulnerability in the Linux kernel's Bluetooth L2CAP implementation allows attackers to potentially execute arbitrary code or crash th...
Oct 21, 2024This is a use-after-free vulnerability in the Linux kernel's Xen netback driver that could allow attackers to crash the kernel or potentially execute ...
Oct 21, 2024This is a use-after-free vulnerability in the Linux kernel's PXA framebuffer driver that could allow local privilege escalation. The vulnerability occ...
Oct 21, 2024This is a use-after-free vulnerability in the Linux kernel's ext4 filesystem driver that allows attackers to potentially crash the system or execute a...
Oct 21, 2024This is a use-after-free vulnerability in the Linux kernel's ext4 filesystem driver that occurs when EXT_DEBUG is enabled. It allows potential kernel ...
Oct 21, 2024This CVE describes a use-after-free vulnerability in the Linux kernel's Xe graphics driver. It allows attackers to potentially crash the system or exe...
Oct 21, 2024A use-after-free vulnerability in the Linux kernel's Direct Rendering Manager (DRM) Xe driver allows local attackers to trigger memory corruption. Thi...
Oct 21, 2024This CVE describes a use-after-free vulnerability in the Linux kernel's BFQ I/O scheduler. An attacker with local access can trigger memory corruption...
Oct 21, 2024This CVE describes a use-after-free vulnerability in the Linux kernel's RDMA subsystem for Huawei HIP08 hardware. Attackers could potentially exploit ...
Oct 21, 2024This CVE describes a use-after-free vulnerability in the Linux kernel's SCSI driver (libefc) that could allow local attackers to crash the system or p...
Oct 21, 2024A use-after-free vulnerability in the Linux kernel's HiSilicon QM crypto accelerator driver could allow attackers to cause memory corruption or potent...
Oct 21, 2024This CVE describes a use-after-free vulnerability in the Linux kernel's rtw88 WiFi driver. If exploited, it could allow local attackers to crash the s...
Oct 21, 2024This is a use-after-free vulnerability in the Linux kernel's AF_UNIX socket implementation when handling out-of-band (OOB) data. An attacker could exp...
Oct 21, 2024This is a use-after-free vulnerability in the Linux kernel's F2FS filesystem driver, specifically in the garbage collection thread shutdown function. ...
Oct 21, 2024This is a use-after-free vulnerability in the Linux kernel's hugetlb (huge pages) fault handling code. It allows attackers with local access to potent...
Oct 21, 2024CVE-2024-47418 is a use-after-free vulnerability in Adobe Animate that could allow arbitrary code execution when a user opens a malicious file. This a...
Oct 9, 2024Adobe Animate versions 23.0.7, 24.0.4 and earlier contain a use-after-free vulnerability that could allow an attacker to execute arbitrary code on a v...
Oct 9, 2024Adobe Animate versions 23.0.7, 24.0.4 and earlier contain a use-after-free vulnerability that could allow arbitrary code execution when a user opens a...
Oct 9, 2024Adobe Dimension versions 4.0.3 and earlier contain a use-after-free vulnerability that could allow an attacker to execute arbitrary code on a victim's...
Oct 9, 2024This vulnerability in the Windows Graphics Component allows an authenticated attacker to execute arbitrary code with SYSTEM privileges by exploiting a...
Oct 8, 2024This Windows Graphics Component vulnerability allows an authenticated attacker to execute arbitrary code with SYSTEM privileges by exploiting a use-af...
Oct 8, 2024A Use After Free vulnerability in Zelio Soft 2 allows arbitrary code execution when a malicious project file is opened. This affects users of Schneide...
Oct 8, 2024This CVE describes a use-after-free vulnerability (CWE-416) in Qualcomm's memory management subsystem that allows attackers to corrupt memory while ma...
Oct 7, 2024This CVE describes a use-after-free vulnerability in the Linux kernel's ASoC (Audio System on Chip) subsystem for Amlogic AXG sound cards. The vulnera...
Sep 27, 2024This is a use-after-free vulnerability in the Linux kernel's SMB client implementation. When smb2_set_path_size() encounters an -EINVAL error, it inco...
Sep 18, 2024This CVE describes a use-after-free vulnerability in the Linux kernel's ASoC (ALSA System on Chip) DAPM (Dynamic Audio Power Management) component. Wh...
Sep 18, 2024This CVE describes a use-after-free vulnerability in the Linux kernel's netem queuing discipline. When specific traffic control configurations are use...
Sep 18, 2024A use-after-free vulnerability in the Linux kernel's ILA (Identifier Locator Addressing) subsystem allows an attacker to cause a kernel crash or poten...
Sep 18, 2024A use-after-free vulnerability in the Linux kernel's fscache module allows attackers to trigger a kernel panic or potentially execute arbitrary code w...
Sep 18, 2024This CVE describes a use-after-free vulnerability in the Linux kernel's VMCI (Virtual Machine Communication Interface) subsystem. An attacker could ex...
Sep 18, 2024This Linux kernel vulnerability in the binder subsystem allows attackers to corrupt memory offsets, leading to use-after-free conditions. It can resul...
Sep 18, 2024This is a use-after-free vulnerability in the Linux kernel's AMD SFH HID driver that occurs when driver_data is freed before the hid_destroy_device() ...
Sep 18, 2024CVE-2024-41869 is a use-after-free vulnerability in Adobe Acrobat Reader that could allow arbitrary code execution when a user opens a malicious PDF f...
Sep 13, 2024This CVE describes a use-after-free vulnerability in the Linux kernel's NFS server component (nfsd). An attacker could potentially exploit this to cau...
Sep 13, 2024A use-after-free vulnerability in the Linux kernel's DWC3 USB driver for STMicroelectronics platforms could allow local attackers to crash the system ...
Sep 13, 2024This CVE describes a use-after-free vulnerability in the Linux kernel's Xe graphics driver. It allows attackers to potentially crash the system or exe...
Sep 13, 2024This vulnerability in Microsoft Excel allows an attacker to gain elevated privileges by exploiting a use-after-free memory issue (CWE-416). Attackers ...
Sep 10, 2024This vulnerability in Microsoft Office Visio allows attackers to execute arbitrary code on affected systems by tricking users into opening specially c...
Sep 10, 2024This CVE describes an elevation of privilege vulnerability in the Windows Win32 Kernel Subsystem. An attacker who successfully exploits this vulnerabi...
Sep 10, 2024A use-after-free vulnerability in the Linux kernel's MediaTek Wireless Ethernet Driver (mtk_wed) allows local attackers to cause kernel panic and syst...
Sep 4, 2024About Use After Free (CWE-416)
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Our database tracks 2,308 CVEs classified as CWE-416, with 181 rated critical and 1,972 rated high severity. The average CVSS score for Use After Free vulnerabilities is 8.0.
External reference: View CWE-416 on MITRE CWE →
Monitor Use After Free Vulnerabilities
Get alerted when new Use After Free CVEs affect your infrastructure.
Start Monitoring Free