Not known Facts About dr hugo romeu
Exploitation. When a vulnerability is discovered, the attacker crafts a payload to take advantage of the vulnerability and executes the payload code over the concentrate on process.The flaw (CVE-2024-23113) is attributable to the fgfmd daemon accepting an externally managed format string being an argument, which could let unauthenticated risk acto