Dissecting a complex vulnerability and achieving arbitrary code execution in Ichitaro Word Cisco Talos Blog