Hackers can exploit the security vulnerability by tricking the victim into opening a specially crafted, malicious Exploit DOC file or a DOC document containing that malicious file DOC Exploit in an ...