The flaws allow remote code-execution without user interaction or authentication, and are highly exploitable. …read more

Source:: Threatpost