The vulnerability allows attackers to run arbitrary commands remotely using crafted Windows shortcut files with malicious ...