So an outside attacker can get your data or control your machine without user interaction? Or does the user have to install their app first? Also does this impact windows phone sandbox apps?
IF you want more details. I suggest you read the paper linked. That’s why I posted it here, so interested parties might locate information of interest. From the summaries, it looks like it means that their sandboxing is broken. I don’t run windows, so I don’t particularly care about the details.