The vulnerabilities could be exploited to launch remote code execution attacks if a user simply opens an image file or surfs to a rigged Web site.

ปล. แปลโดย google translate

**Hidden Content: To see this hidden content your post count must be 1 or greater.**