This allowed a remote attacker to take control of the infected PC.
A remote, unauthenticated attacker could execute arbitrary code, cause a denial of service, or gain unauthorized access to your files or system.
Version: 0.9.6.1 had a security vulnerability that allowed remote attackers to crash the browser.
The action of viewing a PDF would allow a remote attacker to execute arbitrary malicious code on the target machine, both in Mac and Windows.
The flaw "allows remote attackers to execute arbitrary code via a Workspace with a certain index value that triggers memory corruption," the security vendor's site said.
Like the Excel flaw, a remote attacker could run code with the same rights as the logged on user.
Some malicious software acts as a service, waiting for connections from a remote attacker in order to give him information or control over the machine.
Beginning August 13, 2012, an unidentified remote attacker compromised systems at the Department of Revenue.
Such devices would allow remote attackers to leap past firewalls guarding corporate borders and jump from one network to another to get access to corporate networks.
A second, previously unknown flaw started to draw attention just a week later, this one also allowing a remote attacker to take control of a user's PC.