"The vulnerability, which comes about from the software's Unicode text handling system, allows a remote attacker to execute arbitrary code simply...
Separate names with a comma.