Researchers at Check Point have discovered a flaw affecting several popular media players, stemming from how they process subtitles. If exploited, an attacker could gain remote access to the victim’s system.
Read full news article on CSO
Researchers at Check Point have discovered a flaw affecting several popular media players, stemming from how they process subtitles. If exploited, an attacker could gain remote access to the victim’s system.
Read full news article on CSO