Fragen? Antworten! Siehe auch: Alternativlos
The vulnerability allows remote code execution capabilities and enables an attacker to remotely infect a device by sending emails that consume significant amount of memory