This post was originally published on this site

The flaws allow remote code-execution without user interaction or authentication, and are highly exploitable.

This post first appeared on ThreatPost. click here for original article.

About The Author

Related Posts