CWE-416: Use After Free

Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

2,344
Total CVEs
195
Critical
1,993
High
8.0
Avg CVSS
10
In CISA KEV

Yearly Trend

2026
105
2025
719
2024
659
2023
248
2022
207

Top Affected Vendors

1 Linux 769
2 Google 397
3 Microsoft 261
4 Debian 236
5 Fedoraproject 203
6 Adobe 140
7 Qualcomm 85
8 Foxit 84
9 Apple 77
10 Mozilla 53

All Use After Free CVEs (2,344)

CVE-2023-25001
7.8

A use-after-free vulnerability in Autodesk Navisworks allows malicious SKP files to trigger memory corruption, potentially leading to arbitrary code e...

Jun 27, 2023
CVE-2023-28287
7.8

CVE-2023-28287 is a use-after-free vulnerability in Microsoft Publisher that allows remote code execution when a user opens a specially crafted Publis...

Jun 17, 2023
CVE-2023-34795
7.8

CVE-2023-34795 is a use-after-free vulnerability in xlsxio library versions 0.1.2 to 0.2.34 where the xlsxioread_sheetlist_close() function frees an u...

Jun 16, 2023
CVE-2023-29356
7.8

CVE-2023-29356 is a use-after-free vulnerability in Microsoft ODBC Driver for SQL Server that allows remote code execution. Attackers can exploit this...

Jun 16, 2023
CVE-2023-29321
7.8

Adobe Animate has a use-after-free vulnerability that allows arbitrary code execution when a user opens a malicious file. Attackers can exploit this t...

Jun 15, 2023
CVE-2023-21120
7.8

This CVE describes a use-after-free vulnerability in Android's cdm_engine.cpp that allows local privilege escalation without user interaction. Attacke...

Jun 15, 2023
CVE-2023-29365
7.8

CVE-2023-29365 is a use-after-free vulnerability in Windows Media components that allows remote code execution. An attacker could exploit this by tric...

Jun 14, 2023
CVE-2023-3111
7.8

A use-after-free vulnerability in the Linux kernel's Btrfs filesystem allows local attackers to potentially crash the system or execute arbitrary code...

Jun 5, 2023
CVE-2022-29919
7.8

CVE-2022-29919 is a use-after-free vulnerability in Intel VROC (Virtual RAID on CPU) software that allows authenticated local users to potentially esc...

May 10, 2023
CVE-2023-24953
7.8

CVE-2023-24953 is a use-after-free vulnerability in Microsoft Excel that allows remote code execution when a user opens a specially crafted malicious ...

May 9, 2023
CVE-2023-32233
7.8

CVE-2023-32233 is a use-after-free vulnerability in the Linux kernel's Netfilter nf_tables subsystem that allows unprivileged local users to perform a...

May 8, 2023
CVE-2023-27969
7.8

This CVE describes a use-after-free vulnerability in Apple operating systems that allows an app to execute arbitrary code with kernel privileges. It a...

May 8, 2023
CVE-2022-33292
7.8

This CVE describes a use-after-free memory corruption vulnerability in Qualcomm's Inter-Processor Communication (IPC) subsystem. Attackers could explo...

May 2, 2023
CVE-2023-2235
7.8

A use-after-free vulnerability in the Linux kernel's Performance Events (perf) subsystem allows local attackers to escalate privileges from an unprivi...

May 1, 2023
CVE-2023-26392
7.8

CVE-2023-26392 is a use-after-free vulnerability in Adobe Substance 3D Stager that allows arbitrary code execution when a user opens a malicious file....

Apr 12, 2023
CVE-2023-26423
7.8

Adobe Acrobat Reader versions 23.001.20093 and earlier, and 20.005.30441 and earlier, contain a use-after-free vulnerability that could allow an attac...

Apr 12, 2023
CVE-2023-26419
7.8

This CVE describes a use-after-free vulnerability in Adobe Acrobat Reader that could allow attackers to execute arbitrary code when a user opens a mal...

Apr 12, 2023
CVE-2023-26417
7.8

CVE-2023-26417 is a use-after-free vulnerability in Adobe Acrobat Reader that allows arbitrary code execution when a user opens a malicious PDF file. ...

Apr 12, 2023
CVE-2023-1829
7.8

CVE-2023-1829 is a use-after-free vulnerability in the Linux kernel's traffic control index filter (tcindex) that allows local attackers to escalate p...

Apr 12, 2023
CVE-2023-28285
7.8

CVE-2023-28285 is a use-after-free vulnerability in Microsoft Office that allows remote code execution when a user opens a specially crafted malicious...

Apr 11, 2023
CVE-2023-1670
7.8

A use-after-free vulnerability in the Linux kernel's Xircom 16-bit PCMCIA Ethernet driver allows local users to crash the system or potentially escala...

Mar 30, 2023
CVE-2022-43649
7.8

CVE-2022-43649 is a use-after-free vulnerability in Foxit PDF Reader that allows remote code execution when users open malicious PDF files or visit ma...

Mar 29, 2023
CVE-2022-43638
7.8

This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files containing specially crafted U...

Mar 29, 2023
CVE-2022-43641
7.8

This vulnerability in Foxit PDF Reader allows remote attackers to disclose sensitive information by exploiting a flaw in U3D file parsing. Attackers c...

Mar 29, 2023
CVE-2022-37384
7.8

This vulnerability in Foxit PDF Reader allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files or visitin...

Mar 29, 2023
CVE-2022-37387
7.8

This vulnerability in Foxit PDF Reader allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files containing...

Mar 29, 2023
CVE-2022-37389
7.8

This vulnerability in Foxit PDF Reader allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files containing...

Mar 29, 2023
CVE-2022-37391
7.8

This vulnerability in Foxit PDF Reader allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files or visitin...

Mar 29, 2023
CVE-2022-37374
7.8

CVE-2022-37374 is a use-after-free vulnerability in PDF-XChange Editor's PNG file parser that allows remote code execution. Attackers can exploit this...

Mar 29, 2023
CVE-2022-37381
7.8

This is a use-after-free vulnerability in Foxit PDF Reader's AFSpecial_KeystrokeEx method that allows remote attackers to execute arbitrary code. Atta...

Mar 29, 2023
CVE-2022-28303
7.8

This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious SKP files in Bentley View. Attackers can...

Mar 29, 2023
CVE-2022-28310
7.8

CVE-2022-28310 is a use-after-free vulnerability in Bentley MicroStation CONNECT that allows remote code execution when a user opens a malicious SKP f...

Mar 29, 2023
CVE-2023-25893
7.8

Adobe Dimension versions 3.4.7 and earlier contain a use-after-free vulnerability that could allow arbitrary code execution when a user opens a malici...

Mar 28, 2023
CVE-2023-25899
7.8

CVE-2023-25899 is a use-after-free vulnerability in Adobe Dimension that could allow arbitrary code execution when a user opens a malicious file. This...

Mar 28, 2023
CVE-2023-25908
7.8

Adobe Photoshop versions 23.5.3 and earlier, and 24.1.1 and earlier, contain a use-after-free vulnerability that could allow arbitrary code execution ...

Mar 27, 2023
CVE-2023-25871
7.8

CVE-2023-25871 is a use-after-free vulnerability in Adobe Substance 3D Stager that could allow arbitrary code execution when a user opens a malicious ...

Mar 27, 2023
CVE-2023-0494
7.8

This CVE-2023-0494 vulnerability in X.Org allows attackers to exploit a dangling pointer in DeepCopyPointerClasses via ProcXkbSetDeviceInfo() and Proc...

Mar 27, 2023
CVE-2023-1252
7.8

A use-after-free vulnerability in the Linux kernel's Ext4 file system when used with overlay FS allows a local attacker to crash the system or potenti...

Mar 23, 2023
CVE-2022-4095
7.8

This CVE describes a use-after-free vulnerability in the Linux kernel's RTL8712 wireless driver that allows local attackers to cause denial of service...

Mar 22, 2023
CVE-2023-1281
7.8

A use-after-free vulnerability in the Linux kernel's traffic control index filter (tcindex) allows local attackers to escalate privileges to root. The...

Mar 22, 2023
CVE-2022-42332
7.8

This CVE describes a use-after-free vulnerability in Xen's shadow mode with log-dirty mode enabled. It allows a malicious guest VM to crash the hyperv...

Mar 21, 2023
CVE-2023-23421
7.8

This Windows kernel vulnerability allows an authenticated attacker to execute arbitrary code with elevated SYSTEM privileges by exploiting a use-after...

Mar 14, 2023
CVE-2023-0030
7.8

A use-after-free vulnerability in the Linux kernel's nouveau graphics driver allows a local attacker to trigger a memory overflow via the nvkm_vma_tai...

Mar 8, 2023
CVE-2022-3424
7.8

A use-after-free vulnerability in the Linux kernel's SGI GRU driver allows local attackers to crash the system or potentially escalate privileges. Thi...

Mar 6, 2023
CVE-2023-22424
7.8

A use-after-free vulnerability in Kostac PLC Programming Software (formerly Koyo PLC Programming Software) allows attackers to execute arbitrary code ...

Mar 6, 2023
CVE-2023-22244
7.8

Adobe Premiere Rush versions 2.6 and earlier contain a use-after-free vulnerability that allows arbitrary code execution when a user opens a malicious...

Feb 17, 2023
CVE-2023-21688
7.8

CVE-2023-21688 is a use-after-free vulnerability in the Windows NT kernel that allows local attackers to escalate privileges from a low-privileged use...

Feb 14, 2023
CVE-2023-24581
7.8

A use-after-free vulnerability in Solid Edge CAD software allows attackers to execute arbitrary code by tricking users into opening malicious STP file...

Feb 14, 2023
CVE-2021-33453
7.8

CVE-2021-33453 is a use-after-free vulnerability in lrzip version 0.641 that occurs in the ucompthread() function. This vulnerability could allow atta...

Jul 26, 2022
CVE-2022-28679
7.8

CVE-2022-28679 is a use-after-free vulnerability in Foxit PDF Reader that allows remote attackers to execute arbitrary code. Users who open malicious ...

Jul 18, 2022

About Use After Free (CWE-416)

Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

Our database tracks 2,344 CVEs classified as CWE-416, with 195 rated critical and 1,993 rated high severity. The average CVSS score for Use After Free vulnerabilities is 8.0.

External reference: View CWE-416 on MITRE CWE →

Monitor Use After Free Vulnerabilities

Get alerted when new Use After Free CVEs affect your infrastructure.

Start Monitoring Free