Attacker-supplied HTML or JavaScript code can run in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials and to control how the site is rendered to the user; other attacks are also possible.
Vendor Status:
Currently we are not aware of any vendor-supplied patches