CWE-416: Use After Free
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Yearly Trend
Top Affected Vendors
All Use After Free CVEs (2,327)
PyTorch versions before v2.2.0 contain a use-after-free vulnerability in the mobile interpreter component. This allows attackers to potentially execut...
Apr 17, 2024This CVE-2024-26907 is a use-after-free vulnerability in the Linux kernel's RDMA/mlx5 driver that occurs when accessing Ethernet segments. It allows l...
Apr 17, 2024This CVE describes a use-after-free vulnerability in the Linux kernel's mt7921e WiFi driver. When removing the driver module (rmmod), the system attem...
Apr 17, 2024This is a use-after-free vulnerability in the Linux kernel's wilc1000 WiFi driver that occurs during network interface cleanup. When removing WiFi int...
Apr 17, 2024This vulnerability in the Linux kernel's ATA over Ethernet (AoE) driver allows a use-after-free condition in the aoecmd_cfg_pkts function. Attackers c...
Apr 17, 2024This is a use-after-free vulnerability in the Linux kernel's RDS-TCP implementation that allows local attackers to cause memory corruption, potentiall...
Apr 17, 2024This is a use-after-free vulnerability in the Linux kernel's IPv6 routing subsystem, specifically in the ip6_route_mpath_notify() function. Attackers ...
Apr 17, 2024This is a use-after-free vulnerability in the Linux kernel's sparx5 network driver. It allows attackers with local access to potentially crash the ker...
Apr 17, 2024This is a use-after-free vulnerability in the Linux kernel's Direct Rendering Manager (DRM) subsystem that allows local attackers to potentially escal...
Apr 10, 2024This CVE describes a use-after-free vulnerability in the Linux kernel's dpaa2-eth network driver. When removing the driver, the code accesses a networ...
Apr 10, 2024This is a use-after-free vulnerability in the Linux kernel's RDMA subsystem that occurs during QP (Queue Pair) creation failure. It allows attackers w...
Apr 10, 2024A use-after-free vulnerability in the Linux kernel's lpfc SCSI driver allows local attackers to potentially crash the system or execute arbitrary code...
Apr 10, 2024This vulnerability allows an authenticated attacker to bypass Windows Defender Credential Guard protections and gain elevated privileges on affected W...
Apr 9, 2024A use-after-free vulnerability in the Linux kernel's TLS implementation allows memory corruption when async decryption fails in backlog processing. Th...
Apr 4, 2024A use-after-free and null pointer dereference vulnerability in the Linux kernel's GTP (GPRS Tunneling Protocol) module allows local attackers to cause...
Apr 4, 2024This is a use-after-free vulnerability in Foxit PDF Reader's handling of Doc objects that allows remote attackers to execute arbitrary code when users...
Apr 3, 2024This is a use-after-free vulnerability in Foxit PDF Reader's AcroForm handling that allows remote attackers to execute arbitrary code when a user open...
Apr 3, 2024This is a use-after-free vulnerability in Foxit PDF Reader that allows remote attackers to execute arbitrary code when a user opens a malicious PDF fi...
Apr 3, 2024This is a use-after-free vulnerability in Foxit PDF Reader's AcroForm handling that allows remote attackers to execute arbitrary code when a user open...
Apr 3, 2024This is a use-after-free vulnerability in Foxit PDF Reader's template handling that allows remote attackers to execute arbitrary code when users open ...
Apr 3, 2024This CVE describes a use-after-free vulnerability in the Linux kernel's net/sched: act_mirred component. When redirecting network packets, improper ha...
Apr 3, 2024A use-after-free vulnerability in the Linux kernel's Ceph filesystem driver allows attackers to potentially crash the kernel or execute arbitrary code...
Apr 3, 2024This is a use-after-free vulnerability in the Linux kernel's CAN J1939 subsystem that allows local attackers to potentially crash the kernel or execut...
Apr 3, 2024This CVE describes a use-after-free vulnerability in Foxit PDF Reader's AcroForm handling, allowing remote attackers to execute arbitrary code when a ...
Apr 2, 2024This CVE describes a use-after-free vulnerability in Foxit PDF Reader's AcroForm handling, allowing remote attackers to execute arbitrary code when a ...
Apr 2, 2024A use-after-free vulnerability in Foxit PDF Reader's AcroForm handling allows remote attackers to execute arbitrary code when a user opens a malicious...
Apr 2, 2024This is a use-after-free vulnerability in Foxit PDF Reader's AcroForm handling that allows remote attackers to execute arbitrary code when a user open...
Apr 2, 2024This CVE describes a use-after-free vulnerability in Foxit PDF Reader's AcroForm handling that allows remote code execution. Attackers can exploit it ...
Apr 2, 2024A use-after-free vulnerability in Foxit PDF Reader's annotation handling allows remote attackers to execute arbitrary code when a user opens a malicio...
Apr 2, 2024This is a use-after-free vulnerability in Foxit PDF Reader's Doc object handling that allows remote attackers to execute arbitrary code when a user op...
Apr 2, 2024This is a use-after-free vulnerability in Foxit PDF Reader's AcroForm handling that allows remote attackers to execute arbitrary code when a user open...
Apr 2, 2024CVE-2023-42892 is a use-after-free vulnerability in macOS that allows a local attacker to elevate their privileges. This affects macOS Monterey, Ventu...
Mar 28, 2024A memory corruption vulnerability in Rockwell Automation Arena Simulation software allows attackers to execute arbitrary code by tricking users into o...
Mar 26, 2024CVE-2024-20752 is a use-after-free vulnerability in Adobe Bridge that could allow arbitrary code execution when a user opens a malicious file. This af...
Mar 18, 2024A use-after-free vulnerability in the Linux kernel's TLS offload implementation allows attackers to potentially execute arbitrary code or cause system...
Mar 15, 2024This Linux kernel vulnerability allows a local attacker to trigger a use-after-free condition by modifying the cad_pid sysctl parameter, which could l...
Mar 15, 2024CVE-2024-23300 is a use-after-free vulnerability in GarageBand that allows arbitrary code execution when processing malicious files. Attackers can cra...
Mar 12, 2024This Windows kernel vulnerability allows attackers to escalate privileges from a lower-privileged account to SYSTEM-level access. It affects Windows o...
Mar 12, 2024This is a use-after-free vulnerability in the Windows Graphics Component that allows local attackers to execute arbitrary code with elevated SYSTEM pr...
Mar 12, 2024This vulnerability in Microsoft SharePoint Server allows authenticated attackers to execute arbitrary code remotely by exploiting a use-after-free mem...
Mar 12, 2024This vulnerability in the Linux kernel's btrfs filesystem scrub functionality allows use-after-free conditions when scrubbing filesystems converted fr...
Mar 11, 2024This CVE describes a use-after-free vulnerability in the Linux kernel's RISC-V module loading code. The vulnerability occurs when kernel memory is fre...
Mar 11, 2024A use-after-free vulnerability in the Linux kernel's MediaTek JPEG decoder driver allows local attackers to potentially crash the system or execute ar...
Mar 11, 2024This is a use-after-free vulnerability in the Linux kernel's LLC (Logical Link Control) subsystem. When a closed LLC socket is improperly handled, it ...
Mar 6, 2024This is a use-after-free vulnerability in the JFS filesystem implementation in the Linux kernel. When diMount() fails during inode eviction, the syste...
Mar 6, 2024This is a use-after-free vulnerability in the Linux kernel's netfilter nf_tables subsystem. It allows local attackers to potentially escalate privileg...
Mar 4, 2024This is a use-after-free vulnerability in the Linux kernel's networking subsystem where improper RCU (Read-Copy-Update) handling of socket destination...
Mar 4, 2024A use-after-free vulnerability in the Linux kernel's TOMOYO security module allows attackers with write access to the TOMOYO control interface to caus...
Mar 4, 2024This vulnerability in the Linux kernel's WiFi subsystem (mac80211) could allow use-after-free of cryptographic keys when handling GTK rekey operations...
Mar 2, 2024This is a use-after-free vulnerability in the Linux kernel's RAVB Ethernet driver that could allow local attackers to crash the system or potentially ...
Mar 2, 2024About Use After Free (CWE-416)
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Our database tracks 2,327 CVEs classified as CWE-416, with 195 rated critical and 1,977 rated high severity. The average CVSS score for Use After Free vulnerabilities is 8.0.
External reference: View CWE-416 on MITRE CWE →
Monitor Use After Free Vulnerabilities
Get alerted when new Use After Free CVEs affect your infrastructure.
Start Monitoring Free