Positec uses the Common Vulnerability Severity Scale (CVSS) to assess the severity level of vulnerabilities in combination with the actual impact of the vulnerability on the product, in order to determine the priority of vulnerability remediation and prioritize the handling of the vulnerability. Vulnerabilities are categorized into four levels: Critical, High, Medium, and Low. (The following is for reference and will be updated with industry standards)
Sensitive information leakage. Including, but not limited to, obtaining important keys, passwords, Secret and other available data in the system through reverse, network hijacking, source code and other means.
Local override vulnerabilities. Including, but not limited to, without user interaction, call the system's hidden functions, the user's use of the vulnerability caused by the actual difficulties or actual damage occurred.