![]() Processing a maliciously crafted font may lead to arbitrary code execution.Users may be unable to remove metadata indicating where files were downloaded from.A local attacker may be able to elevate their privileges.Processing a maliciously crafted image may lead to arbitrary code execution.An application may be able to execute arbitrary code with kernel privileges.Processing a maliciously crafted audio file may lead to arbitrary code execution.A remote attacker may be able to cause unexpected application termination or heap corruption.A problem where maliciously crafted audio file could lead to arbitrary code execution a malicious application may be able to read restricted memory. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |