Severities

The severity level assigned to a vulnerability tells you the security risk associated with its exploitation.

Confirmed Vulnerabilities

Confirmed vulnerabilities (QIDs) are design flaws, programming errors, or mis-configurations that make your web application and web application platform susceptible to malicious attacks. Depending on the level of the security risk, the successful exploitation of a confirmed vulnerability can vary from the disclosure of information to a complete compromise of the web application and/or the web application platform. Even if the web application isn't fully compromised, an exploited confirmed vulnerability could still lead to the web application being used to launch attacks against users of the site.

Learn more

Potential Vulnerabilities

Potential Vulnerabilities indicate that the scanner observed a weakness or error that is commonly used to attack a web application, and the scanner was unable to confirm if the weakness or error could be exploited. Where possible, the QID's description and results section include information and hints for following-up with manual analysis. For example, the exploitability of a QID may be influenced by characteristics that the scanner cannot confirm, such as the web application's network architecture, or the test to confirm exploitability requires more intrusive testing than the scanner is designed to conduct.

Learn more

Information Gathered

Information Gathered issues (QIDs) include visible information about the web application's platform, code, or architecture. It may also include information about users of the web application.

Learn more

Severity

Level

Description

One colored block for Minimal severity level for the potential to retrieve information.

Minimal

Intruders may be able to retrieve sensitive information related to the web application platform.

Two colored blocks for Medium severity level for the potential to retrieve information.

Medium

Intruders may be able to retrieve sensitive information related to internal functionality or business logic of the web application.

Three colored blocks for Serious severity level for the potential to retrieve information.

Serious

Intruders may be able to detect highly sensitive data, such as personally identifiable information (PII) about other users of the web application.