2

I'm making a guideline for a bug bounty program and want to distinguish between bugs that require some kind of action on the target's behalf (eg clicking a suspicious link), vs vulnerabilities that can be exploited without any actions from the user (eg, SQL injection that gives you users' credentials).

I don't necessarily mean phishing, just any vulnerability depending on action from the user rather than one that can be done 'cold', if that makes sense.

Does such terminology already exist?

Arminius
  • 44,770
  • 14
  • 145
  • 139
Alex V
  • 200
  • 6

1 Answers1

2

I would describe such vulnerability as needing user interaction.

This is also the term used by CVSS to describe it,

Ángel
  • 18,824
  • 3
  • 28
  • 65