The threat level for this vulnerability may be dramatically increased if more automated methods of distribution are found to be successful, such as e-mail or IM or file shares. The impact of attacks may also increase, with more sinister codes being installed as new hackers attempt to leverage the vulnerability to their advantage.
We use cookies to enhance your browsing experience, analyze site traffic, and personalize content. By clicking "Got It!," you consent to our use of cookies.