2024 CWE Top 25 Most Dangerous Software Weaknesses: Use After Free (CWE-416)
At its core, a Use After Free vulnerability occurs when a program continues to use memory after it has been freed or deallocated. This behaviour can result in undefined behaviour, ranging from crashes and data corruption to critical security breaches, including arbitrary code execution.