http://www.w3.org/ns/prov#value | - - For an attack to be successful, the user would need to visit a website under the attacker's control or receive an HTML e-mail from the attacker. - The vulnerability would not enable an attacker to take any action other than deleting files.
|