...
Title | Description |
---|---|
Easy | The data exposure is easy to exploit. |
Moderate | The data exposure is moderately difficult to exploit. |
Difficult | The data exposure is difficult to exploit. |
Priority Definitions:
P1 Issues are vulnerabilities that can allow a remote attacker to pull data from your application or the user's device or an vulnerability that would be embarrassing to your organization.
P2, P3, and P4 Issues are customer controlled, where the general SLAs are below:
Title | Recommend SLA |
---|---|
P0 | 1 Day |
P1 | Next Release |
P2 | 30 Days |
P3 | 90 Days |
P4 | 365 Days |