angler-fishThe Vulnerability History Project

Severity: User Interaction - Required

Successful exploitation of this vulnerability requires a user to take some action before the vulnerability can be exploited. For example, a successful exploit may only be possible during the installation of an application by a system administrator.

Quote from the CVSS specification

Vulnerabilities with this tag were given a CVSS rating as part of the requirement to be included into the National Vulnerability Database. You can learn more about what the individual scores mean in the CVSS specification document.

Examples


    There are no articles here... yet

expand_less