CWE-416: Use After Free

Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

2,213
Total CVEs
155
Critical
1,903
High
7.9
Avg CVSS
10
In CISA KEV

Yearly Trend

2026
104
2025
719
2024
659
2023
248
2022
207

Top Affected Vendors

1 Linux 763
2 Google 355
3 Microsoft 258
4 Debian 194
5 Fedoraproject 171
6 Adobe 122
7 Foxit 84
8 Qualcomm 78
9 Apple 62
10 Mozilla 47

All Use After Free CVEs (2,213)

CVE-2022-4916
8.8

This is a use-after-free vulnerability in Chrome's media component that allows remote attackers to perform arbitrary read/write operations via a craft...

Jul 29, 2023
CVE-2022-4918
8.8

This is a use-after-free vulnerability in Google Chrome's UI component that allows a remote attacker to perform arbitrary read/write operations via a ...

Jul 29, 2023
CVE-2021-4317
8.8

This is a use-after-free vulnerability in ANGLE (Almost Native Graphics Layer Engine) component of Google Chrome that allows arbitrary read/write oper...

Jul 29, 2023
CVE-2021-4319
8.8

This is a use-after-free vulnerability in Chrome's Blink rendering engine that allows remote attackers to perform arbitrary read/write operations via ...

Jul 29, 2023
CVE-2021-4322
8.8

This vulnerability allows an attacker to execute arbitrary code on a user's system by tricking them into installing a malicious Chrome extension. It a...

Jul 29, 2023
CVE-2023-27379
8.8

A use-after-free vulnerability in Foxit PDF Reader's JavaScript engine allows arbitrary code execution when users open malicious PDF files or visit ma...

Jul 19, 2023
CVE-2023-33876
8.8

A use-after-free vulnerability in Foxit Reader 12.1.2.15332 allows arbitrary code execution when processing malicious PDF files with crafted JavaScrip...

Jul 19, 2023
CVE-2023-3600
8.8

This CVE describes a use-after-free vulnerability in Firefox, Firefox ESR, and Thunderbird that occurs during worker lifecycle management. If exploite...

Jul 12, 2023
CVE-2023-32038
8.8

This vulnerability in Microsoft ODBC Driver allows remote attackers to execute arbitrary code on affected systems by sending specially crafted request...

Jul 11, 2023
CVE-2023-37209
8.8

This CVE describes a use-after-free vulnerability in Firefox's history handling mechanism. Attackers could potentially exploit this to execute arbitra...

Jul 5, 2023
CVE-2023-37201
8.8

This vulnerability allows an attacker to trigger a use-after-free condition when establishing a WebRTC connection over HTTPS, potentially leading to a...

Jul 5, 2023
CVE-2023-3422
8.8

This is a use-after-free vulnerability in Google Chrome's Guest View component that allows heap corruption. Attackers can exploit it by convincing use...

Jun 26, 2023
CVE-2023-32373
8.8

This CVE describes a use-after-free vulnerability in Apple's WebKit browser engine that could allow arbitrary code execution when processing malicious...

Jun 23, 2023
CVE-2023-21108
8.8

This CVE describes a use-after-free vulnerability in Android's Bluetooth SDP discovery component that allows remote code execution over Bluetooth when...

Jun 15, 2023
CVE-2023-3214
8.8

This critical vulnerability in Google Chrome's Autofill payments feature allows remote attackers to execute arbitrary code via heap corruption. Attack...

Jun 13, 2023
CVE-2023-29536
8.8

This is a use-after-free vulnerability in Mozilla's memory manager that allows an attacker to cause incorrect pointer freeing, leading to memory corru...

Jun 2, 2023
CVE-2023-25739
8.8

This vulnerability is a use-after-free flaw in Firefox, Thunderbird, and Firefox ESR that occurs when failed module load requests aren't properly chec...

Jun 2, 2023
CVE-2023-2931
8.8

This is a use-after-free vulnerability in Chrome's PDF renderer that allows remote attackers to trigger heap corruption via malicious PDF files. Succe...

May 30, 2023
CVE-2023-2933
8.8

This is a use-after-free vulnerability in Chrome's PDF viewer that allows remote attackers to trigger heap corruption via malicious PDF files. Success...

May 30, 2023
CVE-2023-2203
8.8

CVE-2023-2203 is a use-after-free vulnerability in WebKitGTK caused by improper input validation. Attackers can exploit this by delivering specially c...

May 17, 2023
CVE-2023-2721
8.8

This is a critical use-after-free vulnerability in Google Chrome's navigation component that allows remote attackers to potentially exploit heap corru...

May 16, 2023
CVE-2023-2723
8.8

This is a use-after-free vulnerability in Chrome DevTools that allows a remote attacker who has already compromised the renderer process to potentiall...

May 16, 2023
CVE-2023-2725
8.8

This is a use-after-free vulnerability in Chrome's Guest View component that allows heap corruption. Attackers can exploit it by convincing users to i...

May 16, 2023
CVE-2023-31566
8.8

CVE-2023-31566 is a heap-use-after-free vulnerability in PoDoFo PDF library's encryption component. This allows attackers to potentially execute arbit...

May 10, 2023
CVE-2023-27352
8.8

This vulnerability allows attackers on the same network to execute arbitrary code with root privileges on Sonos One speakers without authentication. T...

Apr 20, 2023
CVE-2023-28297
8.8

This vulnerability in Windows Remote Procedure Call Service allows an authenticated attacker to execute code with SYSTEM privileges by exploiting a us...

Apr 11, 2023
CVE-2023-24925
8.8

This vulnerability allows remote attackers to execute arbitrary code on systems using Microsoft PostScript and PCL6 Class Printer Drivers. Attackers c...

Apr 11, 2023
CVE-2023-28205
8.8

This CVE describes a use-after-free vulnerability in Apple's Safari browser and iOS/iPadOS/macOS operating systems that allows arbitrary code executio...

Apr 10, 2023
CVE-2023-1815
8.8

This is a use-after-free vulnerability in Google Chrome's Networking APIs that allows heap corruption. Attackers can exploit it by tricking users into...

Apr 4, 2023
CVE-2023-1818
8.8

This vulnerability is a use-after-free memory corruption flaw in Chrome's Vulkan graphics implementation. It allows remote attackers to potentially ex...

Apr 4, 2023
CVE-2023-1528
8.8

This is a use-after-free vulnerability in Google Chrome's password management component that allows remote attackers to potentially exploit heap corru...

Mar 21, 2023
CVE-2023-1531
8.8

This vulnerability is a use-after-free memory corruption flaw in ANGLE (Almost Native Graphics Layer Engine) component of Google Chrome. It allows rem...

Mar 21, 2023
CVE-2023-1533
8.8

This is a use-after-free vulnerability in Chrome's WebProtect component that allows remote attackers to potentially exploit heap corruption via crafte...

Mar 21, 2023
CVE-2023-1227
8.8

This is a use-after-free vulnerability in Google Chrome's Core component on Lacros that allows heap corruption through crafted UI interactions. Attack...

Mar 7, 2023
CVE-2023-1213
8.8

This is a use-after-free vulnerability in Google Chrome's SwiftShader component that allows remote attackers to potentially exploit heap corruption. A...

Mar 7, 2023
CVE-2023-1218
8.8

This vulnerability is a use-after-free memory corruption flaw in Chrome's WebRTC component. It allows remote attackers to potentially execute arbitrar...

Mar 7, 2023
CVE-2022-46395
8.8

This vulnerability in Arm Mali GPU Kernel Driver allows a non-privileged user to perform improper GPU processing operations to access already freed me...

Mar 6, 2023
CVE-2023-25362
8.8

A use-after-free vulnerability in WebKitGTK's WebCore::RenderLayer::repaintBlockSelectionGaps function allows remote attackers to execute arbitrary co...

Mar 2, 2023
CVE-2023-25360
8.8

This is a use-after-free vulnerability in WebKitGTK's WebCore::RenderLayer::renderer component that allows remote attackers to execute arbitrary code....

Mar 2, 2023
CVE-2023-0928
8.8

This vulnerability allows remote attackers to potentially execute arbitrary code or cause heap corruption by tricking users into visiting a malicious ...

Feb 22, 2023
CVE-2023-0932
8.8

This is a use-after-free vulnerability in WebRTC component of Google Chrome on Windows that could allow remote attackers to exploit heap corruption. A...

Feb 22, 2023
CVE-2023-0941
8.8

This is a critical use-after-free vulnerability in Google Chrome's Prompts feature that allows remote attackers to potentially exploit heap corruption...

Feb 22, 2023
CVE-2022-2480
8.8

This vulnerability is a use-after-free flaw in Chrome's Service Worker API that allows remote attackers to potentially exploit heap corruption via a c...

Jul 28, 2022
CVE-2022-2163
8.8

This is a use-after-free vulnerability in Google Chrome's Cast UI and Toolbar components. An attacker who convinces a user to install a malicious exte...

Jul 28, 2022
CVE-2022-2477
8.8

This is a use-after-free vulnerability in Google Chrome's Guest View component that allows heap corruption. Attackers can exploit it by tricking users...

Jul 28, 2022
CVE-2022-1919
8.8

This is a use-after-free vulnerability in Chrome's codec components that allows remote attackers to potentially exploit heap corruption via a crafted ...

Jul 28, 2022
CVE-2022-2156
8.8

This is a use-after-free vulnerability in Google Chrome's Core component that allows remote attackers to potentially exploit heap corruption. Attacker...

Jul 28, 2022
CVE-2022-2158
8.8

This vulnerability is a type confusion flaw in Chrome's V8 JavaScript engine that could allow a remote attacker to execute arbitrary code or cause hea...

Jul 28, 2022
CVE-2022-2161
8.8

This is a use-after-free vulnerability in Chrome's WebApp Provider that allows remote attackers to potentially exploit heap corruption. Attackers can ...

Jul 28, 2022
CVE-2022-1863
8.8

This is a use-after-free vulnerability in Chrome's Tab Groups feature that allows heap corruption when a user installs a malicious extension and perfo...

Jul 27, 2022

About Use After Free (CWE-416)

Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

Our database tracks 2,213 CVEs classified as CWE-416, with 155 rated critical and 1,903 rated high severity. The average CVSS score for Use After Free vulnerabilities is 7.9.

External reference: View CWE-416 on MITRE CWE →

Monitor Use After Free Vulnerabilities

Get alerted when new Use After Free CVEs affect your infrastructure.

Start Monitoring Free