List, Can someone please share how this vulnerability actually works. I'm wondering whether its a "You visit a .php page thats infected and your exploited" or whether its a "You click a link on a .php page and it links to a .lnk file and you download it and run it and your exploited."? Can someone please shed some light on this? Daniel