All of the vulnerabilities arise from improper input validations. …read more

Source:: Threatpost