| http://www.w3.org/ns/prov#value | - Typical SeverityHigh Typical Likelihood of ExploitLikelihood: High Methods of AttackModification of Resources Examples-InstancesDescriptionPhishing attacks rely on a user clicking on links on that are supplied to them by attackers masquerading as a trusted resource such as a bank or online auction site.
|