The flaw stems from a deserialization of untrusted data issue, which can be exploited without user interaction in low-complexity attacks.
The flaw stems from a deserialization of untrusted data issue, which can be exploited without user interaction in low-complexity attacks.