Successful exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code, bypass security ...