Successful exploitation of these vulnerabilities could crash the device being accessed or allow arbitrary code execution on the device.

Share This