The allows malicious applications to break out of their sandbox and access the entire operating system, giving an adversary complete control of the targeted device.



Source link

LEAVE A REPLY

Please enter your comment!
Please enter your name here