CWE-416: Use After Free

Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

2,350
Total CVEs
197
Critical
1,997
High
8.0
Avg CVSS
10
In CISA KEV

Yearly Trend

2026
105
2025
719
2024
659
2023
248
2022
207

Top Affected Vendors

1 Linux 769
2 Google 397
3 Microsoft 261
4 Debian 237
5 Fedoraproject 204
6 Adobe 140
7 Qualcomm 85
8 Foxit 84
9 Apple 77
10 Mozilla 53

All Use After Free CVEs (2,350)

CVE-2021-33453
7.8

CVE-2021-33453 is a use-after-free vulnerability in lrzip version 0.641 that occurs in the ucompthread() function. This vulnerability could allow atta...

Jul 26, 2022
CVE-2022-28679
7.8

CVE-2022-28679 is a use-after-free vulnerability in Foxit PDF Reader that allows remote attackers to execute arbitrary code. Users who open malicious ...

Jul 18, 2022
CVE-2022-28669
7.8

This vulnerability in Foxit PDF Reader allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files or visitin...

Jul 18, 2022
CVE-2022-28671
7.8

This is a use-after-free vulnerability in Foxit PDF Reader that allows remote attackers to execute arbitrary code. Attackers can exploit it by trickin...

Jul 18, 2022
CVE-2022-28673
7.8

This is a use-after-free vulnerability in Foxit PDF Reader that allows remote attackers to execute arbitrary code when a user opens a malicious PDF fi...

Jul 18, 2022
CVE-2022-28675
7.8

This vulnerability in Foxit PDF Reader allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files or visitin...

Jul 18, 2022
CVE-2022-28677
7.8

CVE-2022-28677 is a use-after-free vulnerability in Foxit PDF Reader that allows remote attackers to execute arbitrary code. Attackers can exploit thi...

Jul 18, 2022
CVE-2022-34243
7.8

This CVE describes a Use After Free vulnerability in Adobe Photoshop that could allow an attacker to execute arbitrary code on a victim's system. The ...

Jul 15, 2022
CVE-2022-34225
7.8

CVE-2022-34225 is a use-after-free vulnerability in Adobe Acrobat Reader that could allow arbitrary code execution when a user opens a malicious PDF f...

Jul 15, 2022
CVE-2022-34230
7.8

This CVE describes a use-after-free vulnerability in Adobe Acrobat Reader that could allow an attacker to execute arbitrary code on a victim's system....

Jul 15, 2022
CVE-2022-34220
7.8

CVE-2022-34220 is a use-after-free vulnerability in Adobe Acrobat Reader that could allow arbitrary code execution when a user opens a malicious PDF f...

Jul 15, 2022
CVE-2022-22034
7.8

CVE-2022-22034 is an elevation of privilege vulnerability in the Windows Graphics Component that allows an authenticated attacker to execute arbitrary...

Jul 12, 2022
CVE-2022-2345
7.8

This CVE describes a Use After Free vulnerability in Vim text editor versions prior to 9.0.0046. Attackers can exploit this memory corruption flaw by ...

Jul 8, 2022
CVE-2022-33025
7.8

LibreDWG v0.12.4.4608 contains a heap-use-after-free vulnerability in the decode_preR13_section function at decode_r11.c. This allows attackers to pot...

Jun 23, 2022
CVE-2022-33027
7.8

LibreDWG v0.12.4.4608 contains a heap-use-after-free vulnerability in the dwg_add_handleref function that could allow attackers to execute arbitrary c...

Jun 23, 2022
CVE-2022-27868
7.8

A use-after-free vulnerability in Autodesk AutoCAD 2023 allows attackers to execute arbitrary code by tricking users into opening malicious CAT files....

Jun 21, 2022
CVE-2022-30647
7.8

CVE-2022-30647 is a use-after-free vulnerability in Adobe Illustrator that could allow an attacker to execute arbitrary code on a victim's system when...

Jun 15, 2022
CVE-2022-28849
7.8

Adobe Bridge versions 12.0.1 and earlier contain a use-after-free vulnerability that could allow attackers to execute arbitrary code on a victim's sys...

Jun 15, 2022
CVE-2022-29522
7.8

A use-after-free vulnerability in the simulator module of Fuji Electric's V-SFT graphic editor allows attackers to execute arbitrary code or leak info...

Jun 14, 2022
CVE-2022-2042
7.8

CVE-2022-2042 is a use-after-free vulnerability in Vim text editor versions prior to 8.2. This memory corruption flaw could allow attackers to execute...

Jun 10, 2022
CVE-2022-1998
7.8

CVE-2022-1998 is a use-after-free vulnerability in the Linux kernel's fanotify file system notification subsystem. A local attacker could trigger this...

Jun 9, 2022
CVE-2022-32250
7.8

This vulnerability in the Linux kernel's netfilter component allows a local user with namespace creation privileges to escalate to root via a use-afte...

Jun 2, 2022
CVE-2022-1968
7.8

CVE-2022-1968 is a use-after-free vulnerability in Vim text editor versions prior to 8.2. This allows attackers to execute arbitrary code by tricking ...

Jun 2, 2022
CVE-2022-1652
7.8

CVE-2022-1652 is a use-after-free vulnerability in the Linux kernel's floppy disk driver that allows local attackers to execute arbitrary code or caus...

Jun 2, 2022
CVE-2021-42203
7.8

This vulnerability is a heap-use-after-free flaw in swftools that allows attackers to execute arbitrary code by exploiting font extraction in SWF file...

Jun 2, 2022
CVE-2022-1898
7.8

CVE-2022-1898 is a use-after-free vulnerability in Vim text editor that allows attackers to execute arbitrary code by tricking users into opening spec...

May 27, 2022
CVE-2022-1882
7.8

CVE-2022-1882 is a use-after-free vulnerability in the Linux kernel's pipes functionality that allows a local user to crash the system or potentially ...

May 26, 2022
CVE-2022-30065
7.8

CVE-2022-30065 is a use-after-free vulnerability in BusyBox's awk applet that can be triggered by processing a specially crafted awk pattern. This vul...

May 18, 2022
CVE-2022-1679
7.8

CVE-2022-1679 is a use-after-free vulnerability in the Linux kernel's Atheros wireless adapter driver (ath9k_htc). It allows a local attacker to crash...

May 16, 2022
CVE-2022-28823
7.8

CVE-2022-28823 is a use-after-free vulnerability in Adobe Framemaker that could allow an attacker to execute arbitrary code on a victim's system when ...

May 13, 2022
CVE-2021-40399
7.8

This vulnerability allows remote code execution through a maliciously crafted XLS file in WPS Office Spreadsheets. Attackers can exploit a use-after-f...

May 12, 2022
CVE-2022-28838
7.8

This CVE describes a use-after-free vulnerability in Adobe Acrobat Pro DC that could allow an attacker to execute arbitrary code on a victim's system....

May 11, 2022
CVE-2022-28242
7.8

This CVE describes a use-after-free vulnerability in Adobe Acrobat Reader DC that could allow an attacker to execute arbitrary code on a victim's syst...

May 11, 2022
CVE-2022-28238
7.8

A use-after-free vulnerability in Adobe Acrobat Reader DC's annotation processing allows arbitrary code execution when a user opens a malicious PDF fi...

May 11, 2022
CVE-2022-28240
7.8

CVE-2022-28240 is a use-after-free vulnerability in Adobe Acrobat Reader DC that could allow arbitrary code execution when a user opens a malicious PD...

May 11, 2022
CVE-2022-27801
7.8

A use-after-free vulnerability in Adobe Acrobat Reader DC allows attackers to execute arbitrary code when a user opens a malicious PDF file. This affe...

May 11, 2022
CVE-2022-28230
7.8

CVE-2022-28230 is a use-after-free vulnerability in Adobe Acrobat Reader DC's acroform event processing that could allow arbitrary code execution when...

May 11, 2022
CVE-2022-28232
7.8

This CVE describes a use-after-free vulnerability in Adobe Acrobat Reader DC that could allow arbitrary code execution when a user opens a malicious P...

May 11, 2022
CVE-2022-27785
7.8

CVE-2022-27785 is a use-after-free vulnerability in Adobe Acrobat Reader DC's font processing that allows arbitrary code execution when a user opens a...

May 11, 2022
CVE-2022-27789
7.8

CVE-2022-27789 is a use-after-free vulnerability in Adobe Acrobat Reader DC's acroform event processing that could allow arbitrary code execution when...

May 11, 2022
CVE-2022-27795
7.8

A use-after-free vulnerability in Adobe Acrobat Reader DC's acroform event processing allows arbitrary code execution when a user opens a malicious PD...

May 11, 2022
CVE-2022-27797
7.8

This CVE describes a use-after-free vulnerability in Adobe Acrobat Reader DC that could allow arbitrary code execution when processing malicious PDF f...

May 11, 2022
CVE-2022-27799
7.8

This CVE describes a use-after-free vulnerability in Adobe Acrobat Reader DC's acroform event processing. If exploited, it allows arbitrary code execu...

May 11, 2022
CVE-2022-24102
7.8

CVE-2022-24102 is a use-after-free vulnerability in Adobe Acrobat Reader DC that could allow arbitrary code execution when a user opens a malicious PD...

May 11, 2022
CVE-2022-24104
7.8

CVE-2022-24104 is a use-after-free vulnerability in Adobe Acrobat Reader DC that could allow arbitrary code execution when a user opens a malicious PD...

May 11, 2022
CVE-2022-1616
7.8

CVE-2022-1616 is a use-after-free vulnerability in Vim's append_command function that allows attackers to crash the application, bypass memory protect...

May 7, 2022
CVE-2021-39801
7.8

CVE-2021-39801 is a use-after-free vulnerability in the Android kernel's ION memory management subsystem. This allows local attackers to escalate priv...

Apr 12, 2022
CVE-2021-0707
7.8

This CVE describes a use-after-free vulnerability in the Android kernel's DMA buffer subsystem that allows local privilege escalation. An attacker wit...

Apr 12, 2022
CVE-2022-27528
7.8

This vulnerability allows attackers to execute arbitrary code by tricking users into opening malicious DWFX or SKP files in Autodesk Navisworks 2022. ...

Apr 11, 2022
CVE-2022-25789
7.8

A use-after-free vulnerability in Autodesk AutoCAD allows malicious DWF, 3DS, and DWFX files to trigger memory corruption. Successful exploitation cou...

Apr 11, 2022

About Use After Free (CWE-416)

Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

Our database tracks 2,350 CVEs classified as CWE-416, with 197 rated critical and 1,997 rated high severity. The average CVSS score for Use After Free vulnerabilities is 8.0.

External reference: View CWE-416 on MITRE CWE →

Monitor Use After Free Vulnerabilities

Get alerted when new Use After Free CVEs affect your infrastructure.

Start Monitoring Free