CWE-416: Use After Free

Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

2,355
Total CVEs
198
Critical
2,001
High
8.0
Avg CVSS
10
In CISA KEV

Yearly Trend

2026
105
2025
719
2024
659
2023
248
2022
207

Top Affected Vendors

1 Linux 769
2 Google 397
3 Microsoft 261
4 Debian 238
5 Fedoraproject 204
6 Adobe 140
7 Qualcomm 88
8 Foxit 84
9 Apple 77
10 Mozilla 53

All Use After Free CVEs (2,355)

CVE-2022-25789
7.8

A use-after-free vulnerability in Autodesk AutoCAD allows malicious DWF, 3DS, and DWFX files to trigger memory corruption. Successful exploitation cou...

Apr 11, 2022
CVE-2022-28893
7.8

This vulnerability in the Linux kernel's SUNRPC subsystem allows a use-after-free condition when freeing transport structures before sockets are prope...

Apr 11, 2022
CVE-2022-26417
7.8

CVE-2022-26417 is a use-after-free vulnerability in Omron CX-Position software that allows attackers to execute arbitrary code by tricking users into ...

Apr 1, 2022
CVE-2021-39776
7.8

This CVE describes a use-after-free vulnerability in Android's NFC subsystem that could allow local privilege escalation. An attacker with user-level ...

Mar 30, 2022
CVE-2022-1154
7.8

CVE-2022-1154 is a use-after-free vulnerability in Vim's utf_ptr2char function that could allow an attacker to execute arbitrary code or cause a denia...

Mar 30, 2022
CVE-2022-1055
7.8

CVE-2022-1055 is a use-after-free vulnerability in the Linux kernel's tc_new_tfilter function that allows local attackers to escalate privileges. The ...

Mar 29, 2022
CVE-2022-1031
7.8

This is a use-after-free vulnerability in the op_is_set_bp function of radare2, a reverse engineering framework. Attackers could exploit this to execu...

Mar 22, 2022
CVE-2022-22667
7.8

CVE-2022-22667 is a use-after-free vulnerability in iOS/iPadOS that allows malicious applications to execute arbitrary code with kernel privileges. Th...

Mar 18, 2022
CVE-2022-22614
7.8

This is a use-after-free vulnerability in Apple operating systems that allows malicious applications to execute arbitrary code with kernel privileges....

Mar 18, 2022
CVE-2022-1011
7.8

A use-after-free vulnerability in the Linux kernel's FUSE filesystem allows a local attacker to trigger write() operations that can lead to unauthoriz...

Mar 18, 2022
CVE-2022-25230
7.8

A use-after-free vulnerability in Omron CX-Programmer software allows attackers to execute arbitrary code or disclose information when users open mali...

Mar 10, 2022
CVE-2021-3715
7.8

CVE-2021-3715 is a use-after-free vulnerability in the Linux kernel's Traffic Control subsystem that allows unprivileged local users to escalate privi...

Mar 2, 2022
CVE-2022-24062
7.8

CVE-2022-24062 is a use-after-free vulnerability in Sante DICOM Viewer Pro's JP2 file parser that allows remote code execution. Attackers can exploit ...

Feb 18, 2022
CVE-2021-46655
7.8

CVE-2021-46655 is a use-after-free vulnerability in Bentley View's JT file parser that allows remote code execution. Attackers can exploit this by tri...

Feb 18, 2022
CVE-2021-46633
7.8

This is a use-after-free vulnerability in Bentley MicroStation CONNECT's PDF parser that allows remote code execution. Attackers can exploit it by tri...

Feb 18, 2022
CVE-2021-46627
7.8

This vulnerability in Bentley View allows remote attackers to execute arbitrary code by tricking users into opening malicious DXF files. The flaw exis...

Feb 18, 2022
CVE-2021-46601
7.8

This vulnerability in Bentley MicroStation CONNECT allows remote attackers to execute arbitrary code by tricking users into opening malicious JT files...

Feb 18, 2022
CVE-2021-46609
7.8

CVE-2021-46609 is a use-after-free vulnerability in Bentley MicroStation CONNECT's PDF parser that allows remote code execution. Attackers can exploit...

Feb 18, 2022
CVE-2021-46588
7.8

This is a use-after-free vulnerability in Bentley MicroStation CONNECT that allows remote code execution when parsing malicious JT files. Attackers ca...

Feb 18, 2022
CVE-2021-46592
7.8

This vulnerability allows remote attackers to execute arbitrary code on Bentley MicroStation CONNECT installations by tricking users into opening mali...

Feb 18, 2022
CVE-2021-46597
7.8

This vulnerability allows remote attackers to execute arbitrary code on Bentley MicroStation CONNECT installations by tricking users into opening mali...

Feb 18, 2022
CVE-2021-46578
7.8

This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious JT files in Bentley MicroStation CONNECT...

Feb 18, 2022
CVE-2021-46580
7.8

This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious JT files in Bentley MicroStation CONNECT...

Feb 18, 2022
CVE-2021-46582
7.8

This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious JP2 image files in Bentley MicroStation ...

Feb 18, 2022
CVE-2021-44968
7.8

This CVE describes a Use-After-Free vulnerability in IOBit Advanced SystemCare 15 Pro's kernel driver. Attackers can exploit it by sending specific IO...

Feb 18, 2022
CVE-2021-3760
7.8

CVE-2021-3760 is a use-after-free vulnerability in the Linux kernel's NFC (Near Field Communication) subsystem. This flaw allows local attackers to po...

Feb 16, 2022
CVE-2022-20031
7.8

CVE-2022-20031 is a use-after-free vulnerability in the framebuffer (fb) driver of MediaTek chipsets that allows local attackers to escalate privilege...

Feb 9, 2022
CVE-2022-20045
7.8

This CVE describes a use-after-free vulnerability in Bluetooth implementations on MediaTek chipsets. It allows local attackers to crash Bluetooth serv...

Feb 9, 2022
CVE-2022-0443
7.8

CVE-2022-0443 is a use-after-free vulnerability in Vim text editor versions prior to 8.2. This memory corruption flaw could allow attackers to execute...

Feb 2, 2022
CVE-2022-24122
7.8

CVE-2022-24122 is a use-after-free vulnerability in the Linux kernel's ucount.c that allows privilege escalation when unprivileged user namespaces are...

Jan 29, 2022
CVE-2021-34403
7.8

This vulnerability in NVIDIA's nvmap ioctl driver allows local users to exploit a use-after-free condition, potentially gaining elevated privileges, a...

Jan 18, 2022
CVE-2021-45062
7.8

A use-after-free vulnerability in Adobe Acrobat Reader DC allows arbitrary code execution when processing malicious PDF files. Attackers can exploit t...

Jan 14, 2022
CVE-2021-45064
7.8

A use-after-free vulnerability in Adobe Acrobat Reader DC allows arbitrary code execution when a user opens a malicious PDF file. This affects multipl...

Jan 14, 2022
CVE-2021-44701
7.8

CVE-2021-44701 is a use-after-free vulnerability in Adobe Acrobat Reader DC that could allow arbitrary code execution when processing malicious PDF fi...

Jan 14, 2022
CVE-2021-44705
7.8

CVE-2021-44705 is a use-after-free vulnerability in Adobe Acrobat Reader DC that could allow arbitrary code execution when a user opens a malicious PD...

Jan 14, 2022
CVE-2021-39634
7.8

CVE-2021-39634 is a use-after-free vulnerability in the Linux kernel's eventpoll subsystem that allows local attackers to escalate privileges on affec...

Jan 14, 2022
CVE-2021-39681
7.8

CVE-2021-39681 is a use-after-free vulnerability in the Android kernel's delete_protocol function that allows local privilege escalation without user ...

Jan 14, 2022
CVE-2021-34937
7.8

CVE-2021-34937 is a use-after-free vulnerability in Bentley View's JT file parser that allows remote code execution when users open malicious JT files...

Jan 13, 2022
CVE-2021-34939
7.8

CVE-2021-34939 is a use-after-free vulnerability in Bentley View's JT file parser that allows remote code execution when a user opens a malicious JT f...

Jan 13, 2022
CVE-2021-34917
7.8

CVE-2021-34917 is a use-after-free vulnerability in Bentley View's J2K file parser that allows remote code execution when a user opens a malicious J2K...

Jan 13, 2022
CVE-2021-34919
7.8

CVE-2021-34919 is a use-after-free vulnerability in Bentley View's JP2 file parser that allows remote code execution. Attackers can exploit this by tr...

Jan 13, 2022
CVE-2021-34931
7.8

CVE-2021-34931 is a use-after-free vulnerability in Bentley View's JT file parser that allows remote code execution. Attackers can exploit this by tri...

Jan 13, 2022
CVE-2021-34933
7.8

CVE-2021-34933 is a use-after-free vulnerability in Bentley View's JT file parser that allows remote code execution. Attackers can exploit this by tri...

Jan 13, 2022
CVE-2021-34909
7.8

CVE-2021-34909 is a use-after-free vulnerability in Bentley View's JT file parser that allows remote code execution when a user opens a malicious JT f...

Jan 13, 2022
CVE-2021-34911
7.8

CVE-2021-34911 is a use-after-free vulnerability in Bentley View's 3DS file parser that allows remote code execution when users open malicious 3DS fil...

Jan 13, 2022
CVE-2021-34891
7.8

CVE-2021-34891 is a use-after-free vulnerability in Bentley View's JT file parser that allows remote code execution when a user opens a malicious JT f...

Jan 13, 2022
CVE-2021-34895
7.8

CVE-2021-34895 is a use-after-free vulnerability in Bentley View's 3DS file parser that allows remote code execution. Attackers can exploit this by tr...

Jan 13, 2022
CVE-2021-34872
7.8

CVE-2021-34872 is a use-after-free vulnerability in Bentley View that allows remote code execution when users open malicious SKP files. Attackers can ...

Jan 13, 2022
CVE-2021-1029
7.8

CVE-2021-1029 is a local privilege escalation vulnerability in Android's SurfaceFlinger component, allowing an attacker to execute arbitrary code with...

Dec 15, 2021
CVE-2021-1048
7.8

CVE-2021-1048 is a use-after-free vulnerability in the Android kernel's eventpoll subsystem that allows local privilege escalation. An attacker can ex...

Dec 15, 2021

About Use After Free (CWE-416)

Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

Our database tracks 2,355 CVEs classified as CWE-416, with 198 rated critical and 2,001 rated high severity. The average CVSS score for Use After Free vulnerabilities is 8.0.

External reference: View CWE-416 on MITRE CWE →

Monitor Use After Free Vulnerabilities

Get alerted when new Use After Free CVEs affect your infrastructure.

Start Monitoring Free