This metric captures the requirement for a human user, other
than the attacker, to participate in the successful compromise
of the vulnerable component.
The vulnerable system can be exploited
without interaction from any user.
Successful exploitation of this vulnerability
requires a user to take some action before the
vulnerability can be exploited.