Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Note

Scans are not updated in real time. The report is updated weekly on MondaysFridays and can include data from up to two days before being posted.

Severity

Definition

Required Action

Critical

Vulnerabilities classified as Critical represent the most severe security risks. Exploitation of these vulnerabilities often leads to a complete system compromise, including full access to sensitive data, complete control over the system, or severe service disruptions.

Immediate action is required, as these vulnerabilities can cause catastrophic damage if exploited. They might allow remote code execution, full system access, or the spread of malware across networks.

High

High level vulnerabilities pose significant security risks and, if exploited, can lead to substantial damage or loss. They often require user interaction or specific conditions to be met for exploitation.

These vulnerabilities can lead to unauthorized access, data leaks, or service disruptions, and they typically require prompt remediation to avoid exploitation.

Medium

Medium level vulnerabilities present a moderate risk. They may require more complex conditions or specific knowledge to exploit, and their impact is generally less severe than high-level vulnerabilities.

If exploited, these vulnerabilities can lead to partial system compromise, data exposure, or limited functionality loss. They should be addressed, but they may not require immediate action.

Low

Low level vulnerabilities pose minimal risk and are typically difficult to exploit. Their impact is usually limited, and they might require highly specific conditions to be harmful.

These vulnerabilities are unlikely to lead to significant damage or compromise. They should be addressed as part of routine maintenance but are generally not urgent.

...