Processing a maliciously crafted font may lead to arbitrary code execution.Users may be unable to remove metadata indicating where files were downloaded from.A local attacker may be able to elevate their privileges.Processing a maliciously crafted image may lead to arbitrary code execution.An application may be able to execute arbitrary code with kernel privileges.Processing a maliciously crafted audio file may lead to arbitrary code execution.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |