really, "the e-mail application invoked a system library to parse a JPEG," but "the running program" is near sufficient to get a novel.
the next Image was a very potent piece of malware that copied data files through https://zaynabreey840079.blognody.com/29933176/the-basic-principles-of-jpg-exploit-new