2019-09-04 14:40:56
icscert
PUBLISHED
An attacker could use a specially crafted project file to overflow the buffer and execute code under the privileges of the EZ Touch Editor Versions 2.1.0 and prior.