It is possible for a remote attacker to cause malicious code to be executed by embedding in a Lotus Notes object, which is included in an email message targeted to a Lotus Notes user. Opening the email message or viewing the message from a preview pane will execute the code.
It is possible for a remote attacker to cause malicious code to be executed by embedding in a Lotus Notes object, which is included in an email message targeted to a Lotus Notes user. Opening the email message or viewing the message from a preview pane will execute the code.