Attackers can remotely execute code on targeted systems via specially crafted subtitle files for videos.
Comments are closed here.
Comments are closed here.