The vulnerabilities could be exploited to launch remote code execution attacks if a user simply opens an image file or surfs to a rigged Web site.
ปล. แปลโดย google translate
**Hidden Content: To see this hidden content your post count must be 1 or greater.**