These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system.

**Hidden Content: To see this hidden content your post count must be 1 or greater.**