http://www.zdnet.com/blog/security/m...85?tag=nl.e589
Summary: The most severe vulnerabilities could allow remote code execution if a user simply views a specially crafted web page using Internet Explorer.
Comment