Part of the significance of this vulnerability announcement is that your machine can be exploited without you needing to do anything at all. You don't even have to open an e-mail or attachment, and this happens with the default configuration of the product.
We use cookies to enhance your browsing experience, analyze site traffic, and personalize content. By clicking "Got It!," you consent to our use of cookies.