An unauthenticated remote attacker can use an XSS attack due to improper neutralization of input during web page generation. User interaction is required.Β This leads to a limited impact of confidentiality and integrity but no impact of availability.