Technical Impact: Execute unauthorized code or commands In some circumstances it may be possible to run arbitrary code on a victim's computer when cross-site scripting is combined with other flaws.
Technical Impact: Execute unauthorized code or commandsIn some circumstances it may be possible to run arbitrary code on a victim's computer when cross-site scripting is combined with other flaws.