An attacker can exploit the vulnerability by using a specially crafted WebP file that can result in crashes or arbitrary command execution.
確定! 回上一頁