Proof of Concept: ================= The vulnerability can be exploited by remote attackers with & without required user inter action. For demonstration or reproduce ... PoC: ?¬??????? -??????????????????????¬????????¬?????????????????????¬?????????-??????? ?????????????¬??????????¬???????????????????¬??????????? ¬??????????????????¬???? ????????¬?????????????????-????????????????????????????? ¬??????????????¬??????????????????????????????¬¬????????????????????????????? ¬? or as callto link: Skype Me™! ?call">Skype Me™!