🎄 Join our Annual Holiday wargame and win prizes!


Use After Free

Refers to a memory corruption vulnerability that occurs when a program continues to use a memory location after it has been freed (deallocated or released).

Remediation:

  • When freeing pointers, be sure to set them to NULL once they are freed.

Metadata

  • Severity: medium
  • Slug: use-after-free

CWEs

  • 416: Use After Free

Available Labs

Select a language to explore available labs for this vulnerability.

Deco line
Deco line

Play AppSec WarGames

Want to skill-up in secure coding and AppSec? Try SecDim Wargames to learn how to find, hack and fix security vulnerabilities inspired by real-world incidents.

Deco line
Deco line

Got a comment?

Join our secure coding and AppSec community. A discussion board to share and discuss all aspects of secure programming, AppSec, DevSecOps, fuzzing, cloudsec, AIsec code review, and more.

Read more