Common Software Vulnerabilities, Part II:

Explaining the Use After Free

Our thinking