User interaction

The user interaction metric indicates the actions that the target user needs to perform (apart from the attacker's action) to successfully exploit the vulnerability. Some vulnerabilities could be exploited solely by the attacker while the others might need additional user interaction/participation:

Parameter

Description

Example

None

The attacker can exploit the vulnerable system/component without requiring any interaction from the victim/user.

Denial of service caused by sending specially crafted TCP packet

Required

Attacker would require the victim (user) to perform some kind of action in order to exploit the vulnerability.

Drive-by-wire attacks, clickjacking

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.191.5.239