CWE-416: Use After Free
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Yearly Trend
Top Affected Vendors
All Use After Free CVEs (2,350)
CVE-2021-33453 is a use-after-free vulnerability in lrzip version 0.641 that occurs in the ucompthread() function. This vulnerability could allow atta...
Jul 26, 2022CVE-2022-28679 is a use-after-free vulnerability in Foxit PDF Reader that allows remote attackers to execute arbitrary code. Users who open malicious ...
Jul 18, 2022This vulnerability in Foxit PDF Reader allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files or visitin...
Jul 18, 2022This is a use-after-free vulnerability in Foxit PDF Reader that allows remote attackers to execute arbitrary code. Attackers can exploit it by trickin...
Jul 18, 2022This is a use-after-free vulnerability in Foxit PDF Reader that allows remote attackers to execute arbitrary code when a user opens a malicious PDF fi...
Jul 18, 2022This vulnerability in Foxit PDF Reader allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files or visitin...
Jul 18, 2022CVE-2022-28677 is a use-after-free vulnerability in Foxit PDF Reader that allows remote attackers to execute arbitrary code. Attackers can exploit thi...
Jul 18, 2022This CVE describes a Use After Free vulnerability in Adobe Photoshop that could allow an attacker to execute arbitrary code on a victim's system. The ...
Jul 15, 2022CVE-2022-34225 is a use-after-free vulnerability in Adobe Acrobat Reader that could allow arbitrary code execution when a user opens a malicious PDF f...
Jul 15, 2022This CVE describes a use-after-free vulnerability in Adobe Acrobat Reader that could allow an attacker to execute arbitrary code on a victim's system....
Jul 15, 2022CVE-2022-34220 is a use-after-free vulnerability in Adobe Acrobat Reader that could allow arbitrary code execution when a user opens a malicious PDF f...
Jul 15, 2022CVE-2022-22034 is an elevation of privilege vulnerability in the Windows Graphics Component that allows an authenticated attacker to execute arbitrary...
Jul 12, 2022This CVE describes a Use After Free vulnerability in Vim text editor versions prior to 9.0.0046. Attackers can exploit this memory corruption flaw by ...
Jul 8, 2022LibreDWG v0.12.4.4608 contains a heap-use-after-free vulnerability in the decode_preR13_section function at decode_r11.c. This allows attackers to pot...
Jun 23, 2022LibreDWG v0.12.4.4608 contains a heap-use-after-free vulnerability in the dwg_add_handleref function that could allow attackers to execute arbitrary c...
Jun 23, 2022A use-after-free vulnerability in Autodesk AutoCAD 2023 allows attackers to execute arbitrary code by tricking users into opening malicious CAT files....
Jun 21, 2022CVE-2022-30647 is a use-after-free vulnerability in Adobe Illustrator that could allow an attacker to execute arbitrary code on a victim's system when...
Jun 15, 2022Adobe Bridge versions 12.0.1 and earlier contain a use-after-free vulnerability that could allow attackers to execute arbitrary code on a victim's sys...
Jun 15, 2022A use-after-free vulnerability in the simulator module of Fuji Electric's V-SFT graphic editor allows attackers to execute arbitrary code or leak info...
Jun 14, 2022CVE-2022-2042 is a use-after-free vulnerability in Vim text editor versions prior to 8.2. This memory corruption flaw could allow attackers to execute...
Jun 10, 2022CVE-2022-1998 is a use-after-free vulnerability in the Linux kernel's fanotify file system notification subsystem. A local attacker could trigger this...
Jun 9, 2022This vulnerability in the Linux kernel's netfilter component allows a local user with namespace creation privileges to escalate to root via a use-afte...
Jun 2, 2022CVE-2022-1968 is a use-after-free vulnerability in Vim text editor versions prior to 8.2. This allows attackers to execute arbitrary code by tricking ...
Jun 2, 2022CVE-2022-1652 is a use-after-free vulnerability in the Linux kernel's floppy disk driver that allows local attackers to execute arbitrary code or caus...
Jun 2, 2022This vulnerability is a heap-use-after-free flaw in swftools that allows attackers to execute arbitrary code by exploiting font extraction in SWF file...
Jun 2, 2022CVE-2022-1898 is a use-after-free vulnerability in Vim text editor that allows attackers to execute arbitrary code by tricking users into opening spec...
May 27, 2022CVE-2022-1882 is a use-after-free vulnerability in the Linux kernel's pipes functionality that allows a local user to crash the system or potentially ...
May 26, 2022CVE-2022-30065 is a use-after-free vulnerability in BusyBox's awk applet that can be triggered by processing a specially crafted awk pattern. This vul...
May 18, 2022CVE-2022-1679 is a use-after-free vulnerability in the Linux kernel's Atheros wireless adapter driver (ath9k_htc). It allows a local attacker to crash...
May 16, 2022CVE-2022-28823 is a use-after-free vulnerability in Adobe Framemaker that could allow an attacker to execute arbitrary code on a victim's system when ...
May 13, 2022This vulnerability allows remote code execution through a maliciously crafted XLS file in WPS Office Spreadsheets. Attackers can exploit a use-after-f...
May 12, 2022This CVE describes a use-after-free vulnerability in Adobe Acrobat Pro DC that could allow an attacker to execute arbitrary code on a victim's system....
May 11, 2022This CVE describes a use-after-free vulnerability in Adobe Acrobat Reader DC that could allow an attacker to execute arbitrary code on a victim's syst...
May 11, 2022A use-after-free vulnerability in Adobe Acrobat Reader DC's annotation processing allows arbitrary code execution when a user opens a malicious PDF fi...
May 11, 2022CVE-2022-28240 is a use-after-free vulnerability in Adobe Acrobat Reader DC that could allow arbitrary code execution when a user opens a malicious PD...
May 11, 2022A use-after-free vulnerability in Adobe Acrobat Reader DC allows attackers to execute arbitrary code when a user opens a malicious PDF file. This affe...
May 11, 2022CVE-2022-28230 is a use-after-free vulnerability in Adobe Acrobat Reader DC's acroform event processing that could allow arbitrary code execution when...
May 11, 2022This CVE describes a use-after-free vulnerability in Adobe Acrobat Reader DC that could allow arbitrary code execution when a user opens a malicious P...
May 11, 2022CVE-2022-27785 is a use-after-free vulnerability in Adobe Acrobat Reader DC's font processing that allows arbitrary code execution when a user opens a...
May 11, 2022CVE-2022-27789 is a use-after-free vulnerability in Adobe Acrobat Reader DC's acroform event processing that could allow arbitrary code execution when...
May 11, 2022A use-after-free vulnerability in Adobe Acrobat Reader DC's acroform event processing allows arbitrary code execution when a user opens a malicious PD...
May 11, 2022This CVE describes a use-after-free vulnerability in Adobe Acrobat Reader DC that could allow arbitrary code execution when processing malicious PDF f...
May 11, 2022This CVE describes a use-after-free vulnerability in Adobe Acrobat Reader DC's acroform event processing. If exploited, it allows arbitrary code execu...
May 11, 2022CVE-2022-24102 is a use-after-free vulnerability in Adobe Acrobat Reader DC that could allow arbitrary code execution when a user opens a malicious PD...
May 11, 2022CVE-2022-24104 is a use-after-free vulnerability in Adobe Acrobat Reader DC that could allow arbitrary code execution when a user opens a malicious PD...
May 11, 2022CVE-2022-1616 is a use-after-free vulnerability in Vim's append_command function that allows attackers to crash the application, bypass memory protect...
May 7, 2022CVE-2021-39801 is a use-after-free vulnerability in the Android kernel's ION memory management subsystem. This allows local attackers to escalate priv...
Apr 12, 2022This CVE describes a use-after-free vulnerability in the Android kernel's DMA buffer subsystem that allows local privilege escalation. An attacker wit...
Apr 12, 2022This vulnerability allows attackers to execute arbitrary code by tricking users into opening malicious DWFX or SKP files in Autodesk Navisworks 2022. ...
Apr 11, 2022A use-after-free vulnerability in Autodesk AutoCAD allows malicious DWF, 3DS, and DWFX files to trigger memory corruption. Successful exploitation cou...
Apr 11, 2022About Use After Free (CWE-416)
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Our database tracks 2,350 CVEs classified as CWE-416, with 197 rated critical and 1,997 rated high severity. The average CVSS score for Use After Free vulnerabilities is 8.0.
External reference: View CWE-416 on MITRE CWE →
Monitor Use After Free Vulnerabilities
Get alerted when new Use After Free CVEs affect your infrastructure.
Start Monitoring Free