//# sourceMappingURL=newsletterForm.js.map window.sliceComponents.newsletterForm = newsletterForm; var triggerHydrate = function() { window.sliceComponents.newsletterForm.hydrate(data, componentContainer); } if (window.lazyObserveElement) { window.lazyObserveElement(componentContainer, triggerHydrate); } else { triggerHydrate(); } } }).catch(err => console.error('%c FTE ','background: #9306F9; color: #ffffff','Hydration Script has failed for newsletterForm-exitIntent Slice', err)); }).catch(err => console.error('%c FTE ','background: #9306F9; color: #ffffff','Externals script failed to load', err));

Call of Duty: WW2 pulled from PC following reports of remote code exploit trolling players with 'Notepad pop-ups, PC shutdowns' and desktop wallpaper of a lawyer

Activision has pulled a specific PC version of Call of Duty: WW2 just days after release, following reports that the game suffers from a remote code execution (RCE) exploit. This affects the so-called "Xbox PC" version of COD: WW2 that was just released on PC Game Pass: the game remains available on Steam and through Battle.net, though perhaps now is not the time to try it out.

RCE exploits are not about in-game cheats or hacks: rather they allow attackers to run nefarious code on a user or organisation's machines via the game software. Online security firm Invicti defines an RCE as "a vulnerability that lets a malicious hacker execute arbitrary code in the programming language in which the developer wrote that application. The term remote means that the attacker can do that from a location other than the system running the application." They're also sometimes called "code injection" attacks.

Article continues below

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.