This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Microsoft Office. User interaction is required to exploit this vulnerability in that the target must visit a malicious page.
-</p>
Make your website safer. Use external penetration testing service. First report ready in one hour!</p>
**Hidden Content: To see this hidden content your post count must be 1 or greater.**