Silent Exploit Doc, Macro exploits require user interaction (e.