CWE-416: Use After Free

Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

2,213
Total CVEs
155
Critical
1,903
High
7.9
Avg CVSS
10
In CISA KEV

Yearly Trend

2026
104
2025
719
2024
659
2023
248
2022
207

Top Affected Vendors

1 Linux 763
2 Google 355
3 Microsoft 258
4 Debian 194
5 Fedoraproject 171
6 Adobe 122
7 Foxit 84
8 Qualcomm 78
9 Apple 62
10 Mozilla 47

All Use After Free CVEs (2,213)

CVE-2022-1865
8.8

This is a use-after-free vulnerability in Chrome's Bookmarks feature that allows heap corruption when a user installs a malicious extension and perfor...

Jul 27, 2022
CVE-2022-1870
8.8

This is a use-after-free vulnerability in Chrome's App Service that allows heap corruption. Attackers who convince users to install malicious extensio...

Jul 27, 2022
CVE-2022-1854
8.8

This is a use-after-free vulnerability in ANGLE (Almost Native Graphics Layer Engine) component of Google Chrome. It allows remote attackers to potent...

Jul 27, 2022
CVE-2022-1856
8.8

This is a use-after-free vulnerability in Chrome's User Education feature that could allow heap corruption. An attacker who convinces a user to instal...

Jul 27, 2022
CVE-2022-1859
8.8

This is a use-after-free vulnerability in Chrome's Performance Manager component that allows remote attackers to potentially exploit heap corruption. ...

Jul 27, 2022
CVE-2022-1861
8.8

This is a use-after-free vulnerability in Chrome OS's Sharing feature that could allow heap corruption. A remote attacker could potentially execute ar...

Jul 27, 2022
CVE-2022-1496
8.8

This is a use-after-free vulnerability in Chrome's File Manager that could allow heap corruption. Attackers could potentially exploit this to execute ...

Jul 26, 2022
CVE-2022-1633
8.8

This is a use-after-free vulnerability in Google Chrome's Sharesheet component on Chrome OS that could allow heap corruption. An attacker could exploi...

Jul 26, 2022
CVE-2022-1635
8.8

This is a use-after-free vulnerability in Google Chrome's permission prompt system that could allow remote attackers to exploit heap corruption throug...

Jul 26, 2022
CVE-2022-1640
8.8

This is a use-after-free vulnerability in Google Chrome's Sharing component that allows remote attackers to potentially exploit heap corruption. Attac...

Jul 26, 2022
CVE-2022-1478
8.8

This is a use-after-free vulnerability in SwiftShader, Chrome's software renderer, that allows remote attackers to potentially exploit heap corruption...

Jul 26, 2022
CVE-2022-1481
8.8

This is a use-after-free vulnerability in Google Chrome's Sharing feature on macOS that allows remote attackers to potentially exploit heap corruption...

Jul 26, 2022
CVE-2022-1491
8.8

This is a use-after-free vulnerability in Google Chrome's bookmarks feature that could allow heap corruption. Attackers could potentially execute arbi...

Jul 26, 2022
CVE-2022-1493
8.8

This is a use-after-free vulnerability in Chrome's Dev Tools that could allow heap corruption. Attackers could potentially execute arbitrary code or c...

Jul 26, 2022
CVE-2022-1305
8.8

This is a use-after-free vulnerability in Chrome's storage component that allows remote attackers to potentially exploit heap corruption via a crafted...

Jul 25, 2022
CVE-2022-1308
8.8

This is a use-after-free vulnerability in Chrome's Back/Forward Cache (BFCache) that allows remote attackers to potentially exploit heap corruption. A...

Jul 25, 2022
CVE-2022-1311
8.8

This is a use-after-free vulnerability in Chrome's shell component on ChromeOS that allows remote attackers to potentially exploit heap corruption. At...

Jul 25, 2022
CVE-2022-1141
8.8

CVE-2022-1141 is a use-after-free vulnerability in Google Chrome's File Manager that could allow remote attackers to exploit heap corruption through s...

Jul 23, 2022
CVE-2022-1125
8.8

This is a use-after-free vulnerability in Google Chrome's Portals feature that could allow remote attackers to exploit heap corruption through specifi...

Jul 23, 2022
CVE-2022-1133
8.8

This is a use-after-free vulnerability in Chrome's WebRTC Perf component that allows remote attackers to potentially exploit heap corruption. Attacker...

Jul 23, 2022
CVE-2022-1135
8.8

This vulnerability is a use-after-free memory corruption flaw in Google Chrome's Shopping Cart feature that allows a remote attacker to potentially ex...

Jul 23, 2022
CVE-2022-0978
8.8

This is a use-after-free vulnerability in ANGLE (Almost Native Graphics Layer Engine) component of Google Chrome that allows remote attackers to poten...

Jul 22, 2022
CVE-2022-0980
8.8

This is a use-after-free vulnerability in Google Chrome's New Tab Page that allows heap corruption. Attackers who convince users to install malicious ...

Jul 22, 2022
CVE-2022-0975
8.8

This vulnerability is a use-after-free memory corruption flaw in ANGLE (Almost Native Graphics Layer Engine) component of Google Chrome. It allows rem...

Jul 21, 2022
CVE-2022-0971
8.8

This is a use-after-free vulnerability in Chrome's Blink layout engine on Android that allows a compromised renderer process to potentially exploit he...

Jul 21, 2022
CVE-2022-21745
8.8

This vulnerability in MediaTek WIFI firmware allows remote attackers to execute arbitrary code with elevated privileges when devices connect to malici...

Jun 6, 2022
CVE-2022-28042
8.8

CVE-2022-28042 is a heap-based use-after-free vulnerability in stb_image.h v2.27's JPEG decoder that allows attackers to execute arbitrary code or cau...

Apr 15, 2022
CVE-2022-0805
8.8

This is a use-after-free vulnerability in Google Chrome's Browser Switcher component that could allow heap corruption. An attacker could exploit this ...

Apr 5, 2022
CVE-2022-0808
8.8

This is a use-after-free vulnerability in Chrome OS Shell that allows remote attackers to potentially exploit heap corruption through user interaction...

Apr 5, 2022
CVE-2022-0458
8.8

This is a use-after-free vulnerability in Chrome's Thumbnail Tab Strip component that allows remote attackers to potentially exploit heap corruption. ...

Apr 5, 2022
CVE-2022-0460
8.8

This is a use-after-free vulnerability in Google Chrome's Window Dialogue component that allows remote attackers to potentially exploit heap corruptio...

Apr 5, 2022
CVE-2022-0463
8.8

This is a use-after-free vulnerability in Chrome's Accessibility component that could allow heap corruption. An attacker could exploit this by trickin...

Apr 5, 2022
CVE-2022-0465
8.8

This CVE describes a use-after-free vulnerability in Chrome's Extensions component that could allow heap corruption. Attackers could potentially explo...

Apr 5, 2022
CVE-2022-0468
8.8

This is a use-after-free vulnerability in Google Chrome's Payments component that allows remote attackers to potentially exploit heap corruption. Atta...

Apr 5, 2022
CVE-2022-0793
8.8

This is a use-after-free vulnerability in Google Chrome's Cast component that could allow heap corruption. Attackers who convince users to install mal...

Apr 5, 2022
CVE-2022-0456
8.8

A use-after-free vulnerability in Chrome's Web Search component allows remote attackers to potentially exploit heap corruption when profiles are destr...

Apr 5, 2022
CVE-2022-0606
8.8

This is a use-after-free vulnerability in ANGLE (Almost Native Graphics Layer Engine) component of Google Chrome that could allow remote attackers to ...

Apr 5, 2022
CVE-2022-22620
8.8

This CVE describes a use-after-free vulnerability in Apple's WebKit browser engine that could allow arbitrary code execution when processing malicious...

Mar 18, 2022
CVE-2022-22590
8.8

CVE-2022-22590 is a use-after-free vulnerability in Apple's WebKit browser engine that allows arbitrary code execution when processing malicious web c...

Mar 18, 2022
CVE-2021-3738
8.8

CVE-2021-3738 is a use-after-free vulnerability in Samba's DCE/RPC implementation where shared database handles can reference invalid user credential ...

Mar 2, 2022
CVE-2022-24363
8.8

CVE-2022-24363 is a use-after-free vulnerability in Foxit PDF Reader that allows remote attackers to execute arbitrary code when users open malicious ...

Feb 18, 2022
CVE-2022-24365
8.8

This is a use-after-free vulnerability in Foxit PDF Reader's AcroForms handling that allows remote code execution. Attackers can exploit it by trickin...

Feb 18, 2022
CVE-2022-24367
8.8

This vulnerability in Foxit PDF Reader allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files or visitin...

Feb 18, 2022
CVE-2022-24357
8.8

CVE-2022-24357 is a use-after-free vulnerability in Foxit PDF Reader that allows remote attackers to execute arbitrary code when users open malicious ...

Feb 18, 2022
CVE-2022-24359
8.8

This vulnerability in Foxit PDF Reader allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files or visitin...

Feb 18, 2022
CVE-2022-0293
8.8

This is a use-after-free vulnerability in Chrome's web packaging component that allows remote attackers to potentially exploit heap corruption. Attack...

Feb 12, 2022
CVE-2022-0295
8.8

This is a use-after-free vulnerability in Chrome's Omnibox (address bar) that allows remote attackers to potentially exploit heap corruption. Attacker...

Feb 12, 2022
CVE-2022-0297
8.8

This is a use-after-free vulnerability in Chrome's Vulkan graphics API implementation that allows remote attackers to potentially exploit heap corrupt...

Feb 12, 2022
CVE-2022-0300
8.8

This is a use-after-free vulnerability in Google Chrome's Text Input Method Editor on Android that allows remote attackers to potentially exploit heap...

Feb 12, 2022
CVE-2022-0302
8.8

This is a use-after-free vulnerability in Google Chrome's Omnibox (address bar) that allows an attacker to potentially exploit heap corruption. Attack...

Feb 12, 2022

About Use After Free (CWE-416)

Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

Our database tracks 2,213 CVEs classified as CWE-416, with 155 rated critical and 1,903 rated high severity. The average CVSS score for Use After Free vulnerabilities is 7.9.

External reference: View CWE-416 on MITRE CWE →

Monitor Use After Free Vulnerabilities

Get alerted when new Use After Free CVEs affect your infrastructure.

Start Monitoring Free