7.5
HIGH
CVE-2021-30169
Webcam Device Unauthorized Credential Disclosure
Description

The sensitive information of webcam device is not properly protected. Remote attackers can unauthentically grant user’s credential.

INFO

Published Date :

April 28, 2021, 10:15 a.m.

Last Modified :

Nov. 21, 2024, 6:03 a.m.

Remotely Exploitable :

Yes !

Impact Score :

3.6

Exploitability Score :

3.9
Affected Products

The following products are affected by CVE-2021-30169 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Meritlilin p2r8852e2_firmware
2 Meritlilin p2r8852e4_firmware
3 Meritlilin p2r6852e2_firmware
4 Meritlilin p2r6852e4_firmware
5 Meritlilin p2r6552e2_firmware
6 Meritlilin p2r6552e4_firmware
7 Meritlilin p2r6352ae2_firmware
8 Meritlilin p2r6352ae4_firmware
9 Meritlilin p2r3052ae2_firmware
10 Meritlilin p2g1052_firmware
11 Meritlilin p2r8822e2_firmware
12 Meritlilin p2r8822e4_firmware
13 Meritlilin p2r6822e2_firmware
14 Meritlilin p2r6822e4_firmware
15 Meritlilin p2r6522e2_firmware
16 Meritlilin p2r6522e4_firmware
17 Meritlilin p2r6322ae2_firmware
18 Meritlilin p2r6322ae4_firmware
19 Meritlilin p2r3022ae2_firmware
20 Meritlilin p2g1022_firmware
21 Meritlilin p2g1022x_firmware
22 Meritlilin z2r8852ax_firmware
23 Meritlilin z2r8152x-p_firmware
24 Meritlilin z2r8152x2-p_firmware
25 Meritlilin z2r8052ex25_firmware
26 Meritlilin z2r6552x_firmware
27 Meritlilin z2r6452ax_firmware
28 Meritlilin z2r6452ax-p_firmware
29 Meritlilin z2r8822ax_firmware
30 Meritlilin z2r8122x-p_firmware
31 Meritlilin z2r8122x2-p_firmware
32 Meritlilin z2r8022ex25_firmware
33 Meritlilin z2r6522x_firmware
34 Meritlilin z2r6422ax_firmware
35 Meritlilin z2r6422ax-p_firmware
36 Meritlilin p3r6322e2_firmware
37 Meritlilin p3r6522e2_firmware
38 Meritlilin p3r8822e2_firmware
39 Meritlilin z3r6422x3_firmware
40 Meritlilin z3r6522x_firmware
41 Meritlilin z3r8922x3_firmware
42 Meritlilin p2r8852e2
43 Meritlilin p2r8852e4
44 Meritlilin p2r6852e2
45 Meritlilin p2r6852e4
46 Meritlilin p2r6552e2
47 Meritlilin p2r6552e4
48 Meritlilin p2r6352ae2
49 Meritlilin p2r6352ae4
50 Meritlilin p2r3052ae2
51 Meritlilin p2g1052
52 Meritlilin p2r8822e2
53 Meritlilin p2r8822e4
54 Meritlilin p2r6822e2
55 Meritlilin p2r6822e4
56 Meritlilin p2r6522e2
57 Meritlilin p2r6522e4
58 Meritlilin p2r6322ae2
59 Meritlilin p2r6322ae4
60 Meritlilin p2r3022ae2
61 Meritlilin p2g1022
62 Meritlilin p2g1022x
63 Meritlilin z2r8852ax
64 Meritlilin z2r8152x-p
65 Meritlilin z2r8152x2-p
66 Meritlilin z2r8052ex25
67 Meritlilin z2r6552x
68 Meritlilin z2r6452ax
69 Meritlilin z2r6452ax-p
70 Meritlilin z2r8822ax
71 Meritlilin z2r8122x-p
72 Meritlilin z2r8122x2-p
73 Meritlilin z2r8022ex25
74 Meritlilin z2r6522x
75 Meritlilin z2r6422ax
76 Meritlilin z2r6422ax-p
77 Meritlilin p3r6322e2
78 Meritlilin p3r6522e2
79 Meritlilin p3r8822e2
80 Meritlilin z3r6422x3
81 Meritlilin z3r6522x
82 Meritlilin z3r8922x3
References to Advisories, Solutions, and Tools

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2021-30169 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2021-30169 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://gist.github.com/keniver/86ebef688fb274b534da51ef1a84dd3e
    Added Reference https://www.chtsecurity.com/news/0b733a38-e616-4ff3-86a6-13e710643388
    Added Reference https://www.meritlilin.com/assets/uploads/support/file/M00166-TW.pdf
    Added Reference https://www.twcert.org.tw/tw/cp-132-4679-d308c-1.html
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • Reanalysis by [email protected]

    Oct. 25, 2022

    Action Type Old Value New Value
    Added CWE NIST CWE-522
  • Initial Analysis by [email protected]

    May. 07, 2021

    Action Type Old Value New Value
    Added CVSS V2 NIST (AV:N/AC:L/Au:N/C:P/I:N/A:N)
    Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    Changed Reference Type https://gist.github.com/keniver/86ebef688fb274b534da51ef1a84dd3e No Types Assigned https://gist.github.com/keniver/86ebef688fb274b534da51ef1a84dd3e Third Party Advisory
    Changed Reference Type https://www.chtsecurity.com/news/0b733a38-e616-4ff3-86a6-13e710643388 No Types Assigned https://www.chtsecurity.com/news/0b733a38-e616-4ff3-86a6-13e710643388 Third Party Advisory
    Changed Reference Type https://www.meritlilin.com/assets/uploads/support/file/M00166-TW.pdf No Types Assigned https://www.meritlilin.com/assets/uploads/support/file/M00166-TW.pdf Vendor Advisory
    Changed Reference Type https://www.twcert.org.tw/tw/cp-132-4679-d308c-1.html No Types Assigned https://www.twcert.org.tw/tw/cp-132-4679-d308c-1.html Third Party Advisory
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2r8852e2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2r8852e2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2r8852e4_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2r8852e4:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2r6852e2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2r6852e2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2r6852e4_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2r6852e4:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2r6552e2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2r6552e2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2r6552e4_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2r6552e4:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2r6352ae2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2r6352ae2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2r6352ae4_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2r6352ae4:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2r3052ae2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2r3052ae2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2g1052_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2g1052:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2r8822e2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2r8822e2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2r8822e4_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2r8822e4:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2r6822e2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2r6822e2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2r6822e4_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2r6822e4:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2r6522e2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2r6522e2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2r6522e4_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2r6522e4:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2r6322ae2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2r6322ae2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2r6322ae4_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2r6322ae4:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2r3022ae2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2r3022ae2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2g1022_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2g1022:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2g1022x_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2g1022x:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:z2r8852ax_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:z2r8852ax:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:z2r8152x-p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:z2r8152x-p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:z2r8152x2-p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:z2r8152x2-p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:z2r8052ex25_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:z2r8052ex25:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:z2r6552x_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:z2r6552x:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:z2r6452ax_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:z2r6452ax:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:z2r6452ax-p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:z2r6452ax-p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:z2r8822ax_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:z2r8822ax:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:z2r8122x-p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:z2r8122x-p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:z2r8122x2-p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:z2r8122x2-p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:z2r8022ex25_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:z2r8022ex25:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:z2r6522x_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:z2r6522x:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:z2r6422ax_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:z2r6422ax:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:z2r6422ax-p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:z2r6422ax-p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p3r6322e2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p3r6322e2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p3r6522e2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p3r6522e2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p3r8822e2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p3r8822e2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:z3r6422x3_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:z3r6422x3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:z3r6522x_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:z3r6522x:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:z3r8922x3_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:z3r8922x3:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2021-30169 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2021-30169 weaknesses.

CAPEC-13: Subverting Environment Variable Values Subverting Environment Variable Values CAPEC-22: Exploiting Trust in Client Exploiting Trust in Client CAPEC-59: Session Credential Falsification through Prediction Session Credential Falsification through Prediction CAPEC-60: Reusing Session IDs (aka Session Replay) Reusing Session IDs (aka Session Replay) CAPEC-79: Using Slashes in Alternate Encoding Using Slashes in Alternate Encoding CAPEC-116: Excavation Excavation CAPEC-169: Footprinting Footprinting CAPEC-224: Fingerprinting Fingerprinting CAPEC-285: ICMP Echo Request Ping ICMP Echo Request Ping CAPEC-287: TCP SYN Scan TCP SYN Scan CAPEC-290: Enumerate Mail Exchange (MX) Records Enumerate Mail Exchange (MX) Records CAPEC-291: DNS Zone Transfers DNS Zone Transfers CAPEC-292: Host Discovery Host Discovery CAPEC-293: Traceroute Route Enumeration Traceroute Route Enumeration CAPEC-294: ICMP Address Mask Request ICMP Address Mask Request CAPEC-295: Timestamp Request Timestamp Request CAPEC-296: ICMP Information Request ICMP Information Request CAPEC-297: TCP ACK Ping TCP ACK Ping CAPEC-298: UDP Ping UDP Ping CAPEC-299: TCP SYN Ping TCP SYN Ping CAPEC-300: Port Scanning Port Scanning CAPEC-301: TCP Connect Scan TCP Connect Scan CAPEC-302: TCP FIN Scan TCP FIN Scan CAPEC-303: TCP Xmas Scan TCP Xmas Scan CAPEC-304: TCP Null Scan TCP Null Scan CAPEC-305: TCP ACK Scan TCP ACK Scan CAPEC-306: TCP Window Scan TCP Window Scan CAPEC-307: TCP RPC Scan TCP RPC Scan CAPEC-308: UDP Scan UDP Scan CAPEC-309: Network Topology Mapping Network Topology Mapping CAPEC-310: Scanning for Vulnerable Software Scanning for Vulnerable Software CAPEC-312: Active OS Fingerprinting Active OS Fingerprinting CAPEC-313: Passive OS Fingerprinting Passive OS Fingerprinting CAPEC-317: IP ID Sequencing Probe IP ID Sequencing Probe CAPEC-318: IP 'ID' Echoed Byte-Order Probe IP 'ID' Echoed Byte-Order Probe CAPEC-319: IP (DF) 'Don't Fragment Bit' Echoing Probe IP (DF) 'Don't Fragment Bit' Echoing Probe CAPEC-320: TCP Timestamp Probe TCP Timestamp Probe CAPEC-321: TCP Sequence Number Probe TCP Sequence Number Probe CAPEC-322: TCP (ISN) Greatest Common Divisor Probe TCP (ISN) Greatest Common Divisor Probe CAPEC-323: TCP (ISN) Counter Rate Probe TCP (ISN) Counter Rate Probe CAPEC-324: TCP (ISN) Sequence Predictability Probe TCP (ISN) Sequence Predictability Probe CAPEC-325: TCP Congestion Control Flag (ECN) Probe TCP Congestion Control Flag (ECN) Probe CAPEC-326: TCP Initial Window Size Probe TCP Initial Window Size Probe CAPEC-327: TCP Options Probe TCP Options Probe CAPEC-328: TCP 'RST' Flag Checksum Probe TCP 'RST' Flag Checksum Probe CAPEC-329: ICMP Error Message Quoting Probe ICMP Error Message Quoting Probe CAPEC-330: ICMP Error Message Echoing Integrity Probe ICMP Error Message Echoing Integrity Probe CAPEC-472: Browser Fingerprinting Browser Fingerprinting CAPEC-497: File Discovery File Discovery CAPEC-508: Shoulder Surfing Shoulder Surfing CAPEC-573: Process Footprinting Process Footprinting CAPEC-574: Services Footprinting Services Footprinting CAPEC-575: Account Footprinting Account Footprinting CAPEC-576: Group Permission Footprinting Group Permission Footprinting CAPEC-577: Owner Footprinting Owner Footprinting CAPEC-616: Establish Rogue Location Establish Rogue Location CAPEC-643: Identify Shared Files/Directories on System Identify Shared Files/Directories on System CAPEC-646: Peripheral Footprinting Peripheral Footprinting CAPEC-651: Eavesdropping Eavesdropping CAPEC-50: Password Recovery Exploitation Password Recovery Exploitation CAPEC-102: Session Sidejacking Session Sidejacking CAPEC-474: Signature Spoofing by Key Theft Signature Spoofing by Key Theft CAPEC-509: Kerberoasting Kerberoasting CAPEC-551: Modify Existing Service Modify Existing Service CAPEC-555: Remote Services with Stolen Credentials Remote Services with Stolen Credentials CAPEC-560: Use of Known Domain Credentials Use of Known Domain Credentials CAPEC-561: Windows Admin Shares with Stolen Credentials Windows Admin Shares with Stolen Credentials CAPEC-600: Credential Stuffing Credential Stuffing CAPEC-644: Use of Captured Hashes (Pass The Hash) Use of Captured Hashes (Pass The Hash) CAPEC-645: Use of Captured Tickets (Pass The Ticket) Use of Captured Tickets (Pass The Ticket) CAPEC-652: Use of Known Kerberos Credentials Use of Known Kerberos Credentials CAPEC-653: Use of Known Operating System Credentials Use of Known Operating System Credentials
Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.94 }} -0.57%

score

0.74156

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
© cvefeed.io
Latest DB Update: Jun. 23, 2025 0:07