Changes

Jump to: navigation, search

Security Severity Ratings

53 bytes added, 14:17, 4 May 2012
no edit summary
;'''sec-critical''': Exploitable vulnerabilities which can lead to the widespread compromise of many users.
{| class="wikitable collapsible collapsed" style="width: 100%"
! ''sec-critical Examples:''
|-
|
;'''sec-high''': Obtain confidential data from other sites the user is visiting or the local machine, or inject data or code into those sites, requiring no more than normal browsing actions. Indefinite DoS of the user's system, requiring OS reinstallation or extensive cleanup. Exploitable web vulnerabilities that can lead to the targeted compromise of a small number of users.
{| class="wikitable collapsible collapsed" style="width: 100%"
! ''sec-high Examples:''
|-
|
;'''sec-moderate''': Vulnerabilities which can provide an attacker additional information or positioning that could be used in combination with other vulnerabilities. Disclosure of sensitive information that represents a violation of privacy but by itself does not expose the user or organization to immediate risk. The vulnerability combined with another moderate vulnerability could result in an attack of high or critical severity (aka stepping stone). Indefinite application Denial of Service (DoS) via corruption of state, requiring application re-installation or temporary DoS of the user's system, requiring reboot. The lack of standard defense in depth techniques and security controls.
{| class="wikitable collapsible collapsed" style="width: 100%"
! ''sec-moderate Examples:''
|-
|
{| class="wikitable collapsible collapsed" style="width: 100%"
! ''sec-low Examples:''
|-
|
{| class="wikitable collapsible collapsed" style="width: 100%"
! ''sec-other Examples:''
|-
|
Canmove, confirm, emeritus
2,776
edits

Navigation menu