The vulnerabilities could be exploited to launch remote code execution attacks if a user simply opens an image file or surfs to a rigged Web site.
**Hidden Content: To see this hidden content your post count must be 1 or greater.**
Printable View
The vulnerabilities could be exploited to launch remote code execution attacks if a user simply opens an image file or surfs to a rigged Web site.
**Hidden Content: To see this hidden content your post count must be 1 or greater.**