http://www.w3.org/ns/prov#value | - To become a victim of the vulnerability, a user would have to be tricked into clicking a link which would open a new popup window asking them to install a custom button, which appears to be installed from a legitimate site such as Google.
|