Who would be authorized to make the RPC calls needed to exploit the vulnerability?
Related Questions
- Suppose the user opened an RTF file and then saved it as a Word file. If another user later opened the Word file, could it exploit the vulnerability?
- wmf file name extension, can this protect me against attempts to exploit this vulnerability?
- wmf file name extension, can this protect me against attempts to exploit this vulnerability?
- Who would be authorized to make the RPC calls needed to exploit the vulnerability?
- Are Alternative PDF Readers Vulnerable to Acrobat Exploit?
- Are Alternative PDF Readers Vulnerable to Acrobat Exploit?