CWE-416: Use After Free
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Yearly Trend
Top Affected Vendors
All Use After Free CVEs (2,213)
CVE-2022-1106 is a use-after-free vulnerability in mrb_vm_exec in mruby, a lightweight Ruby implementation. This vulnerability allows attackers to exe...
Mar 27, 2022This vulnerability in BlueZ (Linux Bluetooth stack) allows a use-after-free condition when a client disconnects during D-Bus processing of a WriteValu...
Nov 4, 2021A heap-based buffer overflow vulnerability in multiple industrial OPC UA server products allows attackers to crash servers and potentially leak data b...
Jan 14, 2021This vulnerability in the actix-utils Rust crate allows obtaining multiple mutable references to the same data, violating Rust's memory safety guarant...
Dec 31, 2020A Use After Free vulnerability in UniFi Protect Cameras allows remote attackers to execute arbitrary code on affected devices. This affects organizati...
Mar 1, 2025Mbed TLS versions before 3.6.4 contain a use-after-free vulnerability in the mbedtls_x509_string_to_names() function. The function unexpectedly frees ...
Jul 20, 2025This CVE describes a use-after-free vulnerability in Firefox's DOM Core & HTML components that could allow attackers to execute arbitrary code or caus...
Feb 24, 2026This is a use-after-free vulnerability in Chrome's CSS engine that allows remote attackers to execute arbitrary code within the browser's sandbox by t...
Feb 13, 2026This is a use-after-free vulnerability in Chrome's Ozone component that could allow heap corruption when users perform specific UI gestures on a malic...
Feb 11, 2026This is a use-after-free vulnerability in Chrome's CSS engine that allows remote attackers to potentially exploit heap corruption. Attackers can trigg...
Feb 11, 2026A use-after-free vulnerability in Firefox's Layout: Scrolling and Overflow component allows attackers to execute arbitrary code by tricking users into...
Jan 27, 2026This CVE describes a use-after-free vulnerability in ANGLE (Almost Native Graphics Layer Engine) in Google Chrome that could allow heap corruption. At...
Jan 20, 2026This vulnerability allows non-privileged users to exploit improper GPU resource management through system calls, potentially leading to use-after-free...
Jan 13, 2026A use-after-free vulnerability in Firefox and Thunderbird's IPC component allows attackers to execute arbitrary code or cause denial of service. This ...
Jan 13, 2026This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious SFD font files or visiting malicious web...
Dec 31, 2025A use-after-free vulnerability in FontForge's SFD file parser allows remote attackers to execute arbitrary code when users open malicious SFD files or...
Dec 31, 2025A use-after-free vulnerability in Apple's WebKit browser engine allows processing malicious web content to execute arbitrary code. This affects multip...
Dec 17, 2025This vulnerability is a use-after-free flaw in Chrome's WebGPU implementation that allows remote attackers to potentially exploit heap corruption. Att...
Dec 16, 2025This CVE describes a use-after-free vulnerability in Chrome's Media Stream component that could allow heap corruption. Attackers could exploit this vi...
Dec 2, 2025This is a use-after-free vulnerability in Google Chrome's Digital Credentials feature that allows heap corruption. Attackers who compromise the render...
Dec 2, 2025This CVE describes a use-after-free vulnerability in the WebRTC audio/video component of Mozilla products. It allows attackers to execute arbitrary co...
Nov 11, 2025This is a use-after-free vulnerability in the Audio/Video component of Mozilla products that could allow an attacker to execute arbitrary code or caus...
Nov 11, 2025This CVE describes a use-after-free vulnerability in the Ozone component of Google Chrome on Linux and ChromeOS. It allows a remote attacker to potent...
Nov 10, 2025This is a use-after-free vulnerability in Chrome's storage component that allows remote code execution when processing malicious video files. Attacker...
Nov 6, 2025A use-after-free vulnerability in Google Chrome's Safe Browsing feature allows attackers who have already compromised the renderer process to potentia...
Nov 6, 2025A use-after-free vulnerability in Apple's WebKit browser engine allows memory corruption when processing malicious web content. This affects users of ...
Nov 5, 2025This CVE describes a use-after-free vulnerability in QuickJS's object printing functions. When printing arrays, maps, or sets, attacker-defined callba...
Oct 16, 2025This vulnerability is a use-after-free memory corruption flaw in Microsoft Remote Desktop Client that allows unauthorized attackers to execute arbitra...
Oct 14, 2025A use-after-free vulnerability in WebRTC in Google Chrome allows remote attackers to potentially exploit heap corruption via a crafted HTML page. This...
Sep 24, 2025This CVE describes a use-after-free vulnerability in Android's Chrome sandbox that allows local attackers to escape the sandbox and attack the system_...
Sep 4, 2025This CVE describes a use-after-free vulnerability in Bluetooth SDP server code that allows remote code execution without user interaction. Attackers w...
Aug 26, 2025This CVE describes a use-after-free vulnerability in Android's Bluetooth HFP (Hands-Free Profile) implementation that allows remote code execution wit...
Aug 26, 2025This critical vulnerability in Google Chrome's ANGLE graphics engine allows attackers to execute arbitrary code or cause system crashes by exploiting ...
Aug 26, 2025This is a use-after-free vulnerability in Chrome's Aura UI framework that could allow heap corruption. Attackers can exploit it by tricking users into...
Aug 13, 2025This CVE describes a use-after-free vulnerability in Vim's tuple reference management when processing nested tuples in Vim script. An attacker could e...
Aug 11, 2025A use-after-free vulnerability in Google Chrome's extension system allows remote attackers to potentially exploit heap corruption via a malicious Chro...
Aug 7, 2025This use-after-free vulnerability in Chrome's Cast component allows attackers to potentially exploit heap corruption by tricking users into visiting m...
Aug 7, 2025This is a use-after-free vulnerability in Chrome's Media Stream component that allows remote attackers to potentially exploit heap corruption. Attacke...
Jul 30, 2025This CVE describes a use-after-free vulnerability in WebRTC within Google Chrome that could allow remote attackers to exploit heap corruption. Attacke...
Jul 15, 2025CVE-2025-47986 is a use-after-free vulnerability in the Universal Print Management Service that allows authenticated attackers to execute arbitrary co...
Jul 8, 2025This is a use-after-free vulnerability in Chrome's Metrics component that allows remote attackers to potentially exploit heap corruption. Attackers ca...
Jun 18, 2025This is a use-after-free vulnerability in Chrome's Blink rendering engine that could allow remote attackers to execute arbitrary code or cause denial ...
Jun 3, 2025This is a use-after-free vulnerability in Chrome's compositing engine that allows remote attackers to potentially exploit heap corruption. Attackers c...
May 27, 2025This is a use-after-free vulnerability in Chrome's WebAudio component that allows remote attackers to potentially exploit heap corruption. Attackers c...
May 6, 2025A use-after-free memory corruption vulnerability in Apple operating systems allows local network attackers to corrupt process memory. This affects mac...
Apr 29, 2025This CVE describes a use-after-free vulnerability in Apple's WebKit browser engine that could allow arbitrary code execution when processing malicious...
Apr 11, 2025A use-after-free vulnerability in Chrome's Site Isolation feature allows remote attackers to potentially exploit heap corruption via a crafted HTML pa...
Apr 2, 2025This critical vulnerability in Google Chrome's Lens feature allows remote attackers to execute arbitrary code via heap corruption. Attackers can explo...
Mar 19, 2025A use-after-free vulnerability in Chrome's Inspector component allows remote attackers to potentially exploit heap corruption via specially crafted HT...
Mar 10, 2025A use-after-free vulnerability in Google Chrome's Profiles component allows attackers to potentially exploit heap corruption. This affects users who i...
Mar 5, 2025About Use After Free (CWE-416)
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Our database tracks 2,213 CVEs classified as CWE-416, with 155 rated critical and 1,903 rated high severity. The average CVSS score for Use After Free vulnerabilities is 7.9.
External reference: View CWE-416 on MITRE CWE →
Monitor Use After Free Vulnerabilities
Get alerted when new Use After Free CVEs affect your infrastructure.
Start Monitoring Free