The Vulnerability History Project
Warning: Our website does not support Internet Explorer, please use Edge instead.
Severity: User Interaction - Required
> Successful exploitation of this vulnerability requires a user to take some action before the vulnerability can be exploited. For example, a successful exploit may only be possible during the installation of an application by a system administrator.
Quote from the CVSS specification
Vulnerabilities with this tag were given a CVSS rating as part of the
requirement to be included into the [National Vulnerability
Database](https://nvd.nist.gov/). You can learn more about what the individual
scores mean in the [CVSS specification
We're sorry, we had trouble loading the data...
There are no articles here... yet