By sending special data , An attacker can use this vulnerability to read the contents of system memory or perform a denial of service attack .
確定! 回上一頁