An attacker could exploit the vulnerability by constructing a Web page that, when visited by the user, would execute code of the attackers choice with user privileges.

  • 攻击者可能通过构造一个Web页来利用此漏洞,当用户访问该页时,该页就会利用用户的权限执行攻击者选择的代码。
目录 查词历史