CWE-825: CWE-825
Yearly Trend
Top Affected Vendors
All CWE-825 CVEs (9)
A use-after-free vulnerability in libbiosig's sopen_FAMOS_read function allows arbitrary code execution when processing malicious .famos files. This a...
Feb 20, 2024A use-after-free vulnerability in libxml2 allows attackers to crash applications or cause undefined behavior by providing malicious XML documents with...
Jun 16, 2025A memory management logic error in ClamAV's AutoIt module allows remote attackers to cause denial of service by submitting crafted AutoIt files. This ...
Aug 18, 2023This vulnerability in MongoDB C driver allows reading invalid memory when large options are passed to mongoc_bulk_operation_t functions. This affects ...
Nov 18, 2025An expired pointer dereference vulnerability in Juniper's Routing Protocol Daemon (rpd) allows adjacent attackers to cause denial of service by trigge...
Apr 9, 2025A use-after-free vulnerability in GRUB2's normal command allows attackers to cause denial of service by accessing invalid memory when the module is un...
Nov 18, 2025A memory use-after-free vulnerability in GRUB2's normal module allows attackers to trigger system crashes or potentially compromise data confidentiali...
Nov 18, 2025A use-after-free vulnerability in GRUB2's network module allows attackers to cause denial of service by executing the net_set_vlan command after modul...
Nov 18, 2025A use-after-free vulnerability in GNU GRUB's file-closing process allows attackers to cause bootloader crashes, leading to denial of service. This aff...
Nov 18, 2025About CWE-825 (CWE-825)
Our database tracks 9 CVEs classified as CWE-825, with 2 rated critical and 1 rated high severity. The average CVSS score for CWE-825 vulnerabilities is 6.6.
External reference: View CWE-825 on MITRE CWE →
Monitor CWE-825 Vulnerabilities
Get alerted when new CWE-825 CVEs affect your infrastructure.
Start Monitoring Free