Vulnerabilities allow for remote code execution, creating the potential for attackers to install backdoor Trojans.
Read more
Read more