
image credit: pixabay
Of these, five are use-after-free issues, including four that are considered “high severity.” Use-after-free flaws are triggered when a program does not clear the pointer after freeing memory allocation.
Such vulnerabilities may lead to the execution of arbitrary code, to denial of service, or the corruption of data but, if they are combined with other issues, can allow for a full system compromise.