2024-09-17 17:15:54
icscert
PUBLISHED
This vulnerability occurs when user-supplied input is improperly sanitized and then reflected back to the users browser, allowing an attacker to execute arbitrary JavaScript in the context of the victims browser session.