CWE-416: Use After Free
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Yearly Trend
Top Affected Vendors
All Use After Free CVEs (2,213)
A use-after-free vulnerability in Firefox and Thunderbird on Windows allows a compromised content process to send malicious AudioIPC StreamData to the...
Mar 4, 2025This is a use-after-free vulnerability in Chrome's Network component that allows remote attackers to potentially exploit heap corruption through a cra...
Feb 19, 2025This is a use-after-free vulnerability in Chrome's V8 JavaScript engine that allows remote attackers to potentially exploit heap corruption. Attackers...
Feb 15, 2025A use-after-free vulnerability in PDF-XChange Editor's AcroForm handling allows remote attackers to execute arbitrary code when users open malicious P...
Feb 11, 2025This vulnerability allows remote attackers to execute arbitrary code on Windows systems by exploiting a use-after-free flaw in the Telephony Service. ...
Feb 11, 2025This CVE describes a use-after-free vulnerability in OpenHarmony that allows a local attacker to escalate common permissions to root privileges and le...
Feb 7, 2025This CVE describes a use-after-free vulnerability in Chrome's DevTools that could allow heap corruption when processing malicious Chrome extensions. A...
Jan 29, 2025This CVE describes a use-after-free vulnerability in Apple's image processing components that could allow arbitrary code execution when processing mal...
Jan 27, 2025A use-after-free vulnerability in Foxit Reader 2024.3.0.26795 allows arbitrary code execution when processing malicious PDF files containing specially...
Dec 18, 2024A use-after-free vulnerability in Chrome's Translate component allows remote attackers to potentially exploit heap corruption via a crafted HTML page....
Dec 12, 2024This CVE describes a use-after-free vulnerability in OpenHarmony that allows a local attacker to escalate privileges from common user permissions to r...
Dec 3, 2024This CVE describes a use-after-free vulnerability in Chrome's media component on Windows systems. Attackers can exploit this by tricking users into vi...
Nov 12, 2024This vulnerability in SQL Server Native Client allows remote attackers to execute arbitrary code on affected systems by sending specially crafted requ...
Nov 12, 2024A use-after-free vulnerability in Ivanti Connect Secure and Policy Secure allows authenticated remote attackers to execute arbitrary code on affected ...
Nov 12, 2024This is a use-after-free vulnerability in Google Chrome's Family Experiences component on Android that allows remote attackers to potentially exploit ...
Nov 6, 2024This is a use-after-free vulnerability in Chrome's AI components that allows remote attackers to potentially exploit heap corruption. Attackers can tr...
Oct 15, 2024This is a use-after-free vulnerability in Chrome DevTools that could allow a remote attacker who has already compromised the renderer process to explo...
Oct 15, 2024This is a use-after-free vulnerability in Google Chrome's ParcelTracking component on iOS that allows remote attackers to potentially exploit heap cor...
Oct 15, 2024This vulnerability allows attackers to execute arbitrary code on systems running vulnerable Remote Desktop Client software by sending specially crafte...
Oct 8, 2024This CVE describes a use-after-free vulnerability in Alpine Halo9 devices that allows network-adjacent attackers to execute arbitrary code as root wit...
Sep 28, 2024This is a use-after-free vulnerability in Dawn (WebGPU implementation) in Google Chrome on Windows that allows remote attackers to potentially exploit...
Sep 25, 2024This vulnerability allows remote attackers to execute arbitrary code on affected systems through the Microsoft Management Console (MMC). Attackers cou...
Sep 10, 2024This vulnerability in Microsoft SQL Server Native Scoring allows remote attackers to execute arbitrary code on affected systems. Attackers can exploit...
Sep 10, 2024This CVE describes a use-after-free vulnerability in the ctl_write_buffer function that allows malicious software in a guest VM to achieve code execut...
Sep 5, 2024This CVE describes a use-after-free vulnerability in OpenHarmony that allows a local attacker to escalate common permissions to root and leak sensitiv...
Sep 2, 2024This is a use-after-free vulnerability in Foxit PDF Reader's AcroForm handling that allows remote attackers to execute arbitrary code when a user open...
Aug 21, 2024This is a use-after-free vulnerability in Foxit PDF Reader's AcroForm handling that allows remote code execution when users open malicious PDF files. ...
Aug 21, 2024This is a use-after-free vulnerability in Google Chrome's sharing functionality on iOS that allows remote attackers to potentially exploit heap corrup...
Aug 6, 2024This is a use-after-free vulnerability in Google Chrome's tab management system that allows heap corruption. Attackers can exploit it by tricking user...
Aug 6, 2024This CVE describes a use-after-free vulnerability in Chrome's CSS engine that could allow heap corruption. Attackers can exploit it by tricking users ...
Aug 6, 2024This is a use-after-free vulnerability in Chrome's Loader component that allows remote attackers to potentially exploit heap corruption via a crafted ...
Aug 6, 2024This CVE describes a use-after-free vulnerability in Mozilla's garbage collection mechanism that could allow an attacker to execute arbitrary code or ...
Aug 6, 2024CVE-2024-7530 is a use-after-free vulnerability in Firefox caused by incorrect garbage collection interaction. Attackers could exploit this to execute...
Aug 6, 2024This CVE describes a use-after-free vulnerability in Chrome's DevTools that could allow a remote attacker to exploit heap corruption via a crafted HTM...
Jul 16, 2024This vulnerability is a use-after-free flaw in WebRTC within Google Chrome that allows a remote attacker to potentially exploit heap corruption via a ...
Jul 16, 2024This is a use-after-free vulnerability in Chrome's audio component that allows remote attackers to potentially exploit heap corruption. Attackers can ...
Jul 16, 2024This is a use-after-free vulnerability in Google Chrome's screen capture feature that allows remote attackers to potentially exploit heap corruption. ...
Jul 16, 2024This vulnerability in SQL Server Native Client OLE DB Provider allows remote attackers to execute arbitrary code on affected systems by sending specia...
Jul 9, 2024This is a use-after-free vulnerability in Swiftshader, a software renderer component of Google Chrome. It allows remote attackers to potentially explo...
Jun 24, 2024This is a use-after-free vulnerability in Dawn (WebGPU implementation) in Google Chrome that allows remote attackers to potentially exploit heap corru...
Jun 24, 2024This CVE describes a use-after-free vulnerability in Chrome's V8 JavaScript engine that could allow a remote attacker to exploit heap corruption. Atta...
Jun 11, 2024A use-after-free vulnerability in PDFium, Chrome's PDF rendering engine, allows remote attackers to potentially exploit heap corruption via malicious ...
Jun 11, 2024This is a use-after-free vulnerability in Dawn (WebGPU implementation) in Google Chrome that allows remote attackers to potentially exploit heap corru...
Jun 11, 2024A use-after-free vulnerability in Sonos Era 100's SMB2 message handling allows network-adjacent attackers to execute arbitrary code as root without au...
Jun 6, 2024This is a use-after-free vulnerability in Dawn (WebGPU implementation) in Google Chrome that allows remote attackers to potentially exploit heap corru...
May 30, 2024This is a use-after-free vulnerability in Google Chrome's scheduling component that allows remote code execution within the browser's sandbox. Attacke...
May 22, 2024This CVE describes a use-after-free vulnerability in the Linux kernel's ath11k WiFi driver where DFS radar event handling code fails to properly use R...
May 21, 2024A use-after-free vulnerability in the Linux kernel's sc520_wdt watchdog driver allows potential memory corruption when the module is unloaded. This af...
May 21, 2024A use-after-free vulnerability in the Linux kernel's kprobes subsystem allows attackers to potentially execute arbitrary code with kernel privileges. ...
May 20, 2024A use-after-free vulnerability in the Linux kernel's mlxsw driver allows attackers to potentially execute arbitrary code or crash the system. This aff...
May 17, 2024About Use After Free (CWE-416)
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Our database tracks 2,213 CVEs classified as CWE-416, with 155 rated critical and 1,903 rated high severity. The average CVSS score for Use After Free vulnerabilities is 7.9.
External reference: View CWE-416 on MITRE CWE →
Monitor Use After Free Vulnerabilities
Get alerted when new Use After Free CVEs affect your infrastructure.
Start Monitoring Free