...
Note |
---|
Scans are not updated in real time. The report is updated weekly on MondaysFridays and can include data from up to two days before being posted. |
Severity | Definition | Required Action |
---|---|---|
Critical | Vulnerabilities classified as Critical represent the most severe security risks. Exploitation of these vulnerabilities often leads to a complete system compromise, including full access to sensitive data, complete control over the system, or severe service disruptions. | Immediate action is required, as these vulnerabilities can cause catastrophic damage if exploited. They might allow remote code execution, full system access, or the spread of malware across networks. |
High | High level vulnerabilities pose significant security risks and, if exploited, can lead to substantial damage or loss. They often require user interaction or specific conditions to be met for exploitation. | These vulnerabilities can lead to unauthorized access, data leaks, or service disruptions, and they typically require prompt remediation to avoid exploitation. |
Medium | Medium level vulnerabilities present a moderate risk. They may require more complex conditions or specific knowledge to exploit, and their impact is generally less severe than high-level vulnerabilities. | If exploited, these vulnerabilities can lead to partial system compromise, data exposure, or limited functionality loss. They should be addressed, but they may not require immediate action. |
Low | Low level vulnerabilities pose minimal risk and are typically difficult to exploit. Their impact is usually limited, and they might require highly specific conditions to be harmful. | These vulnerabilities are unlikely to lead to significant damage or compromise. They should be addressed as part of routine maintenance but are generally not urgent. |
...