As I understand it, the Microsoft JPEG vulnerability is exploited by a simple and detectable malforming of a JPEG file. The two bytes that...
Separate names with a comma.