Power BI Fundamentals - Create visualizations and dashboards from scratch
Learn Backend Development Part-Time, Online
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore the dangerous world of Use-After-Free (UAF) vulnerabilities in this 36-minute conference talk from DevConf.CZ 2025. Discover how these stealthy memory management flaws occur when programs continue using memory after it has been freed, creating opportunities for unexpected behavior, crashes, and remote code execution. Learn about the root causes of UAF vulnerabilities, particularly in memory-unsafe languages like C and C++, and witness live demonstrations of how attackers can exploit these flaws to inject malicious code or access sensitive data. Gain practical knowledge of best practices and prevention techniques to safeguard your applications and ensure robust security against these critical security threats.
Syllabus
Understanding & explaining Use-After-Free vulnerability, a critical security flaw - DevConf.CZ 2025
Taught by
DevConf