CWE-416: Use After Free
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Yearly Trend
Top Affected Vendors
All Use After Free CVEs (2,357)
This vulnerability allows remote code execution via specially crafted JT files in Siemens JT2Go and Teamcenter Visualization software. Attackers can e...
Jul 13, 2021This CVE-2021-28691 vulnerability allows a malicious or buggy Xen paravirtualized network frontend to trigger a use-after-free condition in Linux xen-...
Jun 29, 2021This vulnerability in Android's memory management driver allows local privilege escalation through an out-of-bounds write caused by use-after-free. At...
Jun 21, 2021This vulnerability in Android's memory management driver allows local privilege escalation through memory corruption via use-after-free. Attackers can...
Jun 21, 2021This vulnerability in Android's memory management driver allows local attackers to escalate privileges without user interaction by exploiting a use-af...
Jun 21, 2021This vulnerability allows attackers to execute arbitrary code or cause denial-of-service by exploiting a use-after-free memory corruption flaw in Siem...
Jun 17, 2021This vulnerability in Android's memory management driver allows local privilege escalation through memory corruption via use-after-free. Attackers can...
Jun 11, 2021This CVE describes a use-after-free vulnerability in Qualcomm Snapdragon chipsets when handling DMA buffer imports. Attackers could exploit this to ex...
Jun 9, 2021This is a use-after-free vulnerability in the Linux kernel's io_uring subsystem that allows local attackers to potentially escalate privileges or cras...
Jun 7, 2021This CVE describes a use-after-free vulnerability in the Linux kernel's SCTP (Stream Control Transmission Protocol) implementation. Attackers can pote...
Jun 7, 2021This CVE describes a use-after-free vulnerability in the Linux kernel's InfiniBand subsystem (ucma.c). Attackers with local access can exploit this to...
Jun 7, 2021CVE-2021-3516 is a use-after-free vulnerability in libxml2's xmllint tool that allows attackers to execute arbitrary code or cause denial of service b...
Jun 1, 2021This CVE describes a use-after-free vulnerability in the Linux kernel's Sun keyboard driver (sunkbd). An attacker with local access can potentially ex...
May 26, 2021This CVE describes a use-after-free vulnerability in the Linux kernel's NFC LLCP (Logical Link Control Protocol) implementation. An attacker could exp...
May 26, 2021This CVE describes a Use After Free vulnerability in NFC sockets in the Linux Kernel that allows local attackers with CAP_NET_RAW capability to escala...
May 12, 2021This vulnerability in the Windows Graphics Component allows an attacker to execute arbitrary code with elevated privileges by exploiting a use-after-f...
May 11, 2021This is a use-after-free vulnerability in the Windows Graphics Component that allows local attackers to execute arbitrary code with elevated SYSTEM pr...
May 11, 2021This vulnerability allows remote code execution through specially crafted Microsoft Office documents. Attackers can exploit it by tricking users into ...
May 11, 2021CVE-2021-31177 is a use-after-free vulnerability in Microsoft Office that allows remote code execution when a user opens a specially crafted Office do...
May 11, 2021This is a use-after-free vulnerability in Foxit Reader's XFA Forms handling that allows remote code execution. Attackers can exploit it by tricking us...
May 7, 2021This vulnerability in Foxit Reader allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files containing spe...
May 7, 2021This vulnerability in Foxit Reader allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files or visiting ma...
May 7, 2021This is a use-after-free vulnerability in Foxit Reader's XFA Forms handling that allows remote code execution. Attackers can exploit it by tricking us...
May 7, 2021This is a use-after-free vulnerability in Foxit Reader's XFA form handling that allows remote code execution when users open malicious PDF files. Atta...
May 7, 2021This vulnerability in Foxit Reader allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files. The flaw exis...
May 7, 2021This vulnerability in GStreamer's Matroska demuxer allows attackers to trigger use-after-free conditions by processing specially crafted media files. ...
Apr 19, 2021This CVE describes a use-after-free vulnerability in Android's ALooper component that could allow local privilege escalation without user interaction....
Apr 13, 2021This vulnerability in the Linux kernel's KVM subsystem allows out-of-range access to memory slots after deletion, potentially leading to memory corrup...
Apr 7, 2021CVE-2020-9926 is a use-after-free vulnerability in Apple's XML processing that could allow attackers to crash applications or execute arbitrary code b...
Apr 2, 2021This is a use-after-free vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel privileges. It affe...
Apr 2, 2021This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files containing specially crafted U...
Mar 30, 2021This CVE describes a use-after-free vulnerability in the Linux kernel's vhost vDPA driver that occurs when re-opening a character device. Attackers co...
Mar 26, 2021A use-after-free vulnerability in Esri ArcGIS products allows arbitrary code execution when parsing malicious files. Unauthenticated attackers can exp...
Mar 25, 2021This CVE describes a use-after-free vulnerability in Qualcomm GPU drivers that allows attackers to execute arbitrary code or cause denial of service. ...
Mar 17, 2021CVE-2021-3403 is a double-free vulnerability in ytnef's TNEFSubjectHandler function that allows remote attackers to cause denial-of-service or potenti...
Mar 4, 2021CVE-2021-24067 is a use-after-free vulnerability in Microsoft Excel that allows remote code execution when a user opens a specially crafted malicious ...
Feb 25, 2021A use-after-free vulnerability in Linux kernel's io_uring subsystem allows local attackers with user privileges to cause denial of service or potentia...
Feb 23, 2021A use-after-free vulnerability in D-Bus allows memory corruption when multiple usernames share the same UID and have policy rules referencing them. Th...
Feb 15, 2021This CVE describes a use-after-free vulnerability in Adobe Acrobat Reader DC that allows arbitrary code execution when a user opens a malicious PDF fi...
Feb 11, 2021CVE-2021-21041 is a use-after-free vulnerability in Adobe Acrobat Reader DC that allows arbitrary code execution when a user opens a malicious PDF fil...
Feb 11, 2021CVE-2020-27280 is a use-after-free vulnerability in ISPSoft versions 3.12 and earlier that allows arbitrary code execution when processing malicious p...
Jan 26, 2021This CVE describes a use-after-free vulnerability in Android's LazyServiceRegistrar component that could allow local privilege escalation. An attacker...
Jan 11, 2021This vulnerability allows local attackers to escalate privileges on Android devices through an out-of-bounds write caused by a use-after-free bug in t...
Jan 11, 2021This vulnerability in the Rust futures-task crate allows use-after-free memory corruption when handling non-static types in waker functions. Attackers...
Dec 31, 2020This vulnerability allows local privilege escalation on Android 11 devices through memory corruption in the Parcel component. Attackers can exploit a ...
Dec 15, 2020This CVE describes a use-after-free vulnerability in the Android kernel's eventpoll subsystem that allows local privilege escalation. An attacker with...
Dec 14, 2020This CVE describes a use-after-free vulnerability in the Linux kernel's MIDI subsystem. An attacker with local access and permissions to issue ioctl c...
Dec 11, 2020This CVE describes a Use After Free vulnerability in the MuPDF library that occurs when processing PDF files with invalid pixmap dimensions. Attackers...
Dec 9, 2020This CVE describes a use-after-free vulnerability in the Linux kernel's tty subsystem that allows attackers to potentially escalate privileges or cras...
Dec 9, 2020CVE-2020-27918 is a use-after-free vulnerability in Apple's WebKit browser engine that allows arbitrary code execution when processing malicious web c...
Dec 8, 2020About Use After Free (CWE-416)
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Our database tracks 2,357 CVEs classified as CWE-416, with 198 rated critical and 2,003 rated high severity. The average CVSS score for Use After Free vulnerabilities is 8.0.
External reference: View CWE-416 on MITRE CWE →
Monitor Use After Free Vulnerabilities
Get alerted when new Use After Free CVEs affect your infrastructure.
Start Monitoring Free