CWE-416: Use After Free
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Yearly Trend
Top Affected Vendors
All Use After Free CVEs (2,357)
This vulnerability allows attackers to exploit heap corruption through a use-after-free bug in Chrome's extension system. Attackers must convince user...
Jul 23, 2022CVE-2022-2327 is a use-after-free vulnerability in the Linux kernel's io_uring subsystem. It allows local attackers to cause memory corruption, potent...
Jul 22, 2022This CVE describes a use-after-free vulnerability in Juniper's AFT manager process that allows unauthenticated attackers to cause a kernel crash and d...
Jul 20, 2022CVE-2022-22252 is a use-after-free vulnerability in Huawei's DFX module that could allow attackers to crash affected systems or potentially execute ar...
May 13, 2022CVE-2022-27447 is a use-after-free vulnerability in MariaDB Server that occurs in the Binary_string::free_buffer() function. This memory corruption fl...
Apr 14, 2022CVE-2022-27376 is a use-after-free vulnerability in MariaDB Server's Item_args::walk_arg component that can be exploited via specially crafted SQL sta...
Apr 12, 2022This CVE describes a use-after-free vulnerability in Subversion's mod_dav_svn module that can lead to memory corruption. When processing path-based au...
Apr 12, 2022CVE-2022-23308 is a use-after-free vulnerability in libxml2's validation component that allows attackers to potentially execute arbitrary code or caus...
Feb 26, 2022Envoy proxy versions with upstream tunneling configured can crash when a downstream client disconnects while the upstream connection is still being es...
Feb 22, 2022This CVE describes a use-after-free vulnerability in MariaDB's BIGINT data type handling that allows attackers to potentially crash the database serve...
Feb 1, 2022This CVE describes a use-after-free vulnerability in JerryScript's lexer component that could allow memory corruption. Attackers could potentially exe...
Jan 14, 2022This vulnerability in the libpulse-binding Rust crate allows use-after-free memory corruption via the get_context function. Attackers could potentiall...
Dec 27, 2021This vulnerability in the rusqlite Rust crate involves a use-after-free bug in the create_aggregate_function method. Attackers could exploit this to e...
Dec 26, 2021This vulnerability in the rusqlite Rust crate involves a use-after-free bug in the create_collation function. Attackers could exploit this to execute ...
Dec 26, 2021This vulnerability in the rusqlite Rust crate involves a use-after-free bug in the rollback_hook function, which could allow attackers to execute arbi...
Dec 26, 2021This vulnerability in the Rust lru crate allows use-after-free memory corruption when iterators access freed memory after a pop operation. It affects ...
Dec 26, 2021CVE-2021-42074 is a denial-of-service vulnerability in Barrier software versions before 2.3.4 where an unauthenticated attacker can crash the barriers...
Nov 8, 2021This vulnerability allows a malicious document to trigger a use-after-free condition during browser shutdown, leading to memory corruption and potenti...
Nov 3, 2021CVE-2021-22940 is a use-after-free vulnerability in Node.js that allows memory corruption attacks. An attacker could exploit this to potentially execu...
Aug 16, 2021This vulnerability in the heapless Rust crate allows an attacker to cause a use-after-free condition by cloning an iterator that has been partially co...
Aug 8, 2021This CVE describes a memory buffer operation vulnerability in Huawei smartphones that allows attackers to cause denial of service. When exploited, it ...
Jun 30, 2021This CVE describes a memory buffer operation limit vulnerability in Huawei smartphone kernels. Successful exploitation could cause kernel panics and d...
Jun 30, 2021This is a use-after-free vulnerability in FreeBSD's ICMPv6 network stack that allows attackers to potentially execute arbitrary code or cause denial o...
Jun 4, 2021This vulnerability in the actix-http crate for Rust allows attackers to cause a use-after-free condition in the BodyStream component, potentially lead...
Dec 31, 2020CVE-2020-27207 is a use-after-free vulnerability in SQLCipher 4.x that allows remote denial of service attacks. Attackers can exploit this via SQL inj...
Nov 26, 2020CVE-2020-13871 is a use-after-free vulnerability in SQLite's window function implementation that could allow memory corruption. This affects applicati...
Jun 6, 2020CVE-2020-13806 is a use-after-free vulnerability in Foxit Reader and PhantomPDF that occurs when JavaScript executes after document deletion or closur...
Jun 4, 2020This is a use-after-free vulnerability in Huawei E6878-370 mobile WiFi devices that allows attackers to execute malicious code. Attackers can exploit ...
May 21, 2020CVE-2020-1983 is a use-after-free vulnerability in libslirp's IP packet reassembly function that allows specially crafted network packets to cause den...
Apr 22, 2020A use-after-free vulnerability in the wicked network configuration service for SUSE Linux systems allows remote attackers to cause denial of service o...
Mar 2, 2020This vulnerability is a use-after-free flaw in Microsoft's Brokering File System that allows local attackers to execute arbitrary code with elevated p...
Oct 14, 2025This CVE describes a use-after-free vulnerability in the Windows Kernel that allows a local attacker to execute arbitrary code with elevated privilege...
Oct 14, 2025CVE-2025-48004 is a use-after-free vulnerability in Microsoft Brokering File System that allows local attackers to execute arbitrary code with elevate...
Oct 14, 2025A Use After Free vulnerability in RTI Connext Professional Security Plugins allows attackers to manipulate files on affected systems. This affects RTI...
Sep 23, 2025A use-after-free vulnerability in Intel PROSet/Wireless WiFi Software for Windows allows an unauthenticated attacker on the same network to potentiall...
May 13, 2025A use-after-free vulnerability in Intel PROSet/Wireless WiFi and Killer WiFi software for Windows allows an unauthenticated attacker on the same netwo...
Feb 12, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's TCP Authentication Option (TCP-AO) implementation. Attackers could potentially...
May 14, 2024A Use After Free vulnerability in Arm Mali GPU kernel drivers allows a local non-privileged user to perform improper GPU memory operations. On Armv8.0...
May 3, 2024This CVE describes a use-after-free vulnerability in the Linux kernel's rtl8xxxu WiFi driver. When the driver is stopped, a workqueue might still be r...
May 1, 2024This CVE describes a use-after-free vulnerability in the Linux kernel's SCSI subsystem. When removing a SCSI host, the .exit_cmd_priv callback could a...
Apr 28, 2024This vulnerability involves a use-after-free flaw in Microsoft Graphics Component that allows an authenticated attacker to execute arbitrary code with...
Feb 10, 2026A use-after-free vulnerability in Windows BitLocker allows authenticated attackers to execute arbitrary code with elevated privileges on affected syst...
Sep 9, 2025A use-after-free vulnerability in Windows Media allows authenticated attackers to execute arbitrary code with elevated privileges on affected systems....
Jul 8, 2025CVE-2024-30102 is a use-after-free vulnerability (CWE-416) in Microsoft Office that allows remote code execution when a user opens a specially crafted...
Jun 11, 2024This vulnerability allows remote code execution in .NET, .NET Framework, and Visual Studio through a use-after-free memory corruption issue (CWE-416)....
Apr 9, 2024This Windows kernel vulnerability allows an authenticated attacker to execute arbitrary code with elevated SYSTEM privileges. It affects Windows syste...
Mar 12, 2024This vulnerability in Microsoft Edge (Chromium-based) allows attackers to execute arbitrary code on a user's system by tricking them into visiting a m...
Nov 3, 2023This vulnerability in Microsoft Message Queuing (MSMQ) allows remote attackers to execute arbitrary code on affected systems by sending specially craf...
Oct 10, 2023This CVE describes a use-after-free vulnerability in FreeRDP's H.264 video codec implementation that could allow remote code execution or denial of se...
Aug 31, 2023This CVE describes a use-after-free vulnerability in Adobe Acrobat Reader DC that allows authenticated attackers to execute arbitrary code when a vict...
Aug 20, 2021About Use After Free (CWE-416)
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Our database tracks 2,357 CVEs classified as CWE-416, with 198 rated critical and 2,003 rated high severity. The average CVSS score for Use After Free vulnerabilities is 8.0.
External reference: View CWE-416 on MITRE CWE →
Monitor Use After Free Vulnerabilities
Get alerted when new Use After Free CVEs affect your infrastructure.
Start Monitoring Free