No user interaction required – and the exploit could’ve been used to distribute any form of malware.

Leave a Reply