This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
from ZDI: Published Advisories http://ift.tt/2rRuawj
No comments:
Post a Comment