The security defect can be exploited remotely, without authentication, to execute arbitrary code and leak sensitive ...