Description
Content spoofing is possible via URL manipulation in applications that suppor tags. An attacker can potentially exploit this security vulnerability to spoof content and mislead users.
Severity
Severity 2
Fixed Version(s)
Publication date: Tue, 03 Apr 2018 09:15:00 +0000