Changes

Jump to: navigation, search

Security Severity Ratings

1,182 bytes removed, 02:55, 2 June 2016
removing old opsec docs
|-
|}
|}
=== Priority Matrix===
{| class="wikitable collapsible " style="width: 100%"
! Priority Matrix (primarily OpSec)
|-
|
;'''Blocker''': Anything which is easily exploitable or reproducible and/or we are seeing active attempts to exploit. Anything which has a high impact to Mozilla should also be considered. This priority flag should communicate that other work is blocked
by this issue and it should be resolved immediately.
''Examples:''
* SQL injection or Injection Flaws and Remote File Inclusion (RFI)
* Anything which has been publicized as a 0day which falls into the 'Critical' category.
* Flaws being actively used in the wild (chemspill?).
 
;'''Critical''': Vulnerabilities which are exploitable and/or hard to reproduce. We are also not seeing these being actively exploited or have another means to protect against a vulnerability.
''Examples:''
* XSS
* CSRF and Authentication or token handling issues
:'''Major''': Vulnerabilities which have a slightly less degree of impact compared to Critical.
''Examples:''
* Content Spoofing
* Information Disclosure or Error Handling
;'''Normal''': Internal vulnerability with a low likelihood of being remotely exploitable.
|}
[[/Security_Severity_Ratings/archive | archive]]
297
edits

Navigation menu