CWE-416: Use After Free
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Yearly Trend
Top Affected Vendors
All Use After Free CVEs (2,355)
A use-after-free vulnerability in Autodesk AutoCAD allows malicious DWF, 3DS, and DWFX files to trigger memory corruption. Successful exploitation cou...
Apr 11, 2022This vulnerability in the Linux kernel's SUNRPC subsystem allows a use-after-free condition when freeing transport structures before sockets are prope...
Apr 11, 2022CVE-2022-26417 is a use-after-free vulnerability in Omron CX-Position software that allows attackers to execute arbitrary code by tricking users into ...
Apr 1, 2022This CVE describes a use-after-free vulnerability in Android's NFC subsystem that could allow local privilege escalation. An attacker with user-level ...
Mar 30, 2022CVE-2022-1154 is a use-after-free vulnerability in Vim's utf_ptr2char function that could allow an attacker to execute arbitrary code or cause a denia...
Mar 30, 2022CVE-2022-1055 is a use-after-free vulnerability in the Linux kernel's tc_new_tfilter function that allows local attackers to escalate privileges. The ...
Mar 29, 2022This is a use-after-free vulnerability in the op_is_set_bp function of radare2, a reverse engineering framework. Attackers could exploit this to execu...
Mar 22, 2022CVE-2022-22667 is a use-after-free vulnerability in iOS/iPadOS that allows malicious applications to execute arbitrary code with kernel privileges. Th...
Mar 18, 2022This is a use-after-free vulnerability in Apple operating systems that allows malicious applications to execute arbitrary code with kernel privileges....
Mar 18, 2022A use-after-free vulnerability in the Linux kernel's FUSE filesystem allows a local attacker to trigger write() operations that can lead to unauthoriz...
Mar 18, 2022A use-after-free vulnerability in Omron CX-Programmer software allows attackers to execute arbitrary code or disclose information when users open mali...
Mar 10, 2022CVE-2021-3715 is a use-after-free vulnerability in the Linux kernel's Traffic Control subsystem that allows unprivileged local users to escalate privi...
Mar 2, 2022CVE-2022-24062 is a use-after-free vulnerability in Sante DICOM Viewer Pro's JP2 file parser that allows remote code execution. Attackers can exploit ...
Feb 18, 2022CVE-2021-46655 is a use-after-free vulnerability in Bentley View's JT file parser that allows remote code execution. Attackers can exploit this by tri...
Feb 18, 2022This is a use-after-free vulnerability in Bentley MicroStation CONNECT's PDF parser that allows remote code execution. Attackers can exploit it by tri...
Feb 18, 2022This vulnerability in Bentley View allows remote attackers to execute arbitrary code by tricking users into opening malicious DXF files. The flaw exis...
Feb 18, 2022This vulnerability in Bentley MicroStation CONNECT allows remote attackers to execute arbitrary code by tricking users into opening malicious JT files...
Feb 18, 2022CVE-2021-46609 is a use-after-free vulnerability in Bentley MicroStation CONNECT's PDF parser that allows remote code execution. Attackers can exploit...
Feb 18, 2022This is a use-after-free vulnerability in Bentley MicroStation CONNECT that allows remote code execution when parsing malicious JT files. Attackers ca...
Feb 18, 2022This vulnerability allows remote attackers to execute arbitrary code on Bentley MicroStation CONNECT installations by tricking users into opening mali...
Feb 18, 2022This vulnerability allows remote attackers to execute arbitrary code on Bentley MicroStation CONNECT installations by tricking users into opening mali...
Feb 18, 2022This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious JT files in Bentley MicroStation CONNECT...
Feb 18, 2022This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious JT files in Bentley MicroStation CONNECT...
Feb 18, 2022This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious JP2 image files in Bentley MicroStation ...
Feb 18, 2022This CVE describes a Use-After-Free vulnerability in IOBit Advanced SystemCare 15 Pro's kernel driver. Attackers can exploit it by sending specific IO...
Feb 18, 2022CVE-2021-3760 is a use-after-free vulnerability in the Linux kernel's NFC (Near Field Communication) subsystem. This flaw allows local attackers to po...
Feb 16, 2022CVE-2022-20031 is a use-after-free vulnerability in the framebuffer (fb) driver of MediaTek chipsets that allows local attackers to escalate privilege...
Feb 9, 2022This CVE describes a use-after-free vulnerability in Bluetooth implementations on MediaTek chipsets. It allows local attackers to crash Bluetooth serv...
Feb 9, 2022CVE-2022-0443 is a use-after-free vulnerability in Vim text editor versions prior to 8.2. This memory corruption flaw could allow attackers to execute...
Feb 2, 2022CVE-2022-24122 is a use-after-free vulnerability in the Linux kernel's ucount.c that allows privilege escalation when unprivileged user namespaces are...
Jan 29, 2022This vulnerability in NVIDIA's nvmap ioctl driver allows local users to exploit a use-after-free condition, potentially gaining elevated privileges, a...
Jan 18, 2022A use-after-free vulnerability in Adobe Acrobat Reader DC allows arbitrary code execution when processing malicious PDF files. Attackers can exploit t...
Jan 14, 2022A use-after-free vulnerability in Adobe Acrobat Reader DC allows arbitrary code execution when a user opens a malicious PDF file. This affects multipl...
Jan 14, 2022CVE-2021-44701 is a use-after-free vulnerability in Adobe Acrobat Reader DC that could allow arbitrary code execution when processing malicious PDF fi...
Jan 14, 2022CVE-2021-44705 is a use-after-free vulnerability in Adobe Acrobat Reader DC that could allow arbitrary code execution when a user opens a malicious PD...
Jan 14, 2022CVE-2021-39634 is a use-after-free vulnerability in the Linux kernel's eventpoll subsystem that allows local attackers to escalate privileges on affec...
Jan 14, 2022CVE-2021-39681 is a use-after-free vulnerability in the Android kernel's delete_protocol function that allows local privilege escalation without user ...
Jan 14, 2022CVE-2021-34937 is a use-after-free vulnerability in Bentley View's JT file parser that allows remote code execution when users open malicious JT files...
Jan 13, 2022CVE-2021-34939 is a use-after-free vulnerability in Bentley View's JT file parser that allows remote code execution when a user opens a malicious JT f...
Jan 13, 2022CVE-2021-34917 is a use-after-free vulnerability in Bentley View's J2K file parser that allows remote code execution when a user opens a malicious J2K...
Jan 13, 2022CVE-2021-34919 is a use-after-free vulnerability in Bentley View's JP2 file parser that allows remote code execution. Attackers can exploit this by tr...
Jan 13, 2022CVE-2021-34931 is a use-after-free vulnerability in Bentley View's JT file parser that allows remote code execution. Attackers can exploit this by tri...
Jan 13, 2022CVE-2021-34933 is a use-after-free vulnerability in Bentley View's JT file parser that allows remote code execution. Attackers can exploit this by tri...
Jan 13, 2022CVE-2021-34909 is a use-after-free vulnerability in Bentley View's JT file parser that allows remote code execution when a user opens a malicious JT f...
Jan 13, 2022CVE-2021-34911 is a use-after-free vulnerability in Bentley View's 3DS file parser that allows remote code execution when users open malicious 3DS fil...
Jan 13, 2022CVE-2021-34891 is a use-after-free vulnerability in Bentley View's JT file parser that allows remote code execution when a user opens a malicious JT f...
Jan 13, 2022CVE-2021-34895 is a use-after-free vulnerability in Bentley View's 3DS file parser that allows remote code execution. Attackers can exploit this by tr...
Jan 13, 2022CVE-2021-34872 is a use-after-free vulnerability in Bentley View that allows remote code execution when users open malicious SKP files. Attackers can ...
Jan 13, 2022CVE-2021-1029 is a local privilege escalation vulnerability in Android's SurfaceFlinger component, allowing an attacker to execute arbitrary code with...
Dec 15, 2021CVE-2021-1048 is a use-after-free vulnerability in the Android kernel's eventpoll subsystem that allows local privilege escalation. An attacker can ex...
Dec 15, 2021About Use After Free (CWE-416)
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Our database tracks 2,355 CVEs classified as CWE-416, with 198 rated critical and 2,001 rated high severity. The average CVSS score for Use After Free vulnerabilities is 8.0.
External reference: View CWE-416 on MITRE CWE →
Monitor Use After Free Vulnerabilities
Get alerted when new Use After Free CVEs affect your infrastructure.
Start Monitoring Free