It's not that I worry, I would like to understand how this works technically, and if NoScript can really protect against all abuses from buffer overflows, use-after-free and such vulnerabilities, assuming the most secure NS configuration rather than the default one, and no resource allowed, i.e. no JS obviously, but no MP4 and no font either.
From
CWE:
In this scenario, the memory in question is allocated to another pointer validly at some point after it has been freed. The original pointer to the freed memory is used again and points to somewhere within the new allocation. As the data is changed, it corrupts the validly used memory; this induces undefined behavior in the process.
Wouldn't it be possible to have the new allocation be a simple string that happens to be code that has no chance to be executed as-is, because Firefox knows it's just a string, except a use-after-free ends up pointing to it in a way that Firefox doesn't know anymore it's a string or something, and it ends up being executed as JavaScript in a context not controlled by NoScript ? (since Firefox itself lost it)