"value":"User Interface (UI) Misrepresentation of Critical Information vulnerability in DropBox Sign(HelloSign) allows Content Spoofing.\nDisplayed version does not show the layer flattened version, once download, If printed (e.g. via Google Chrome -> Examine the print preview): Will render the vulnerability only, not all layers are flattened.\nThis issue affects DropBox Sign(HelloSign): through 2024-12-04."
"value":"* If other party initiated e-signing - Download the PDF file for a security professionals/educated persons inspection<br>* If possible - Download the PDF file and perform full flattening (of the entire document, not just form fields)"
}
],
"value":"* If other party initiated e-signing - Download the PDF file for a security professionals/educated persons inspection\n* If possible - Download the PDF file and perform full flattening (of the entire document, not just form fields)"
}
],
"exploit":[
{
"lang":"en",
"supportingMedia":[
{
"base64":false,
"type":"text/html",
"value":"Known, potentially in use (e.g., spear phishing)"
}
],
"value":"Known, potentially in use (e.g., spear phishing)"