Attackers can leverage the flaw by convincing users to open a file purported to be a recording of a past WebEx event.
Comments are closed here.
Comments are closed here.