These flaws allow attackers to escape the browser sandbox, access sensitive information on the compromised device, and achieve arbitrary code execution following successful exploitation.
Support the originator by clicking the read the rest link below.