Positec uses the Common Vulnerability Severity Scale (CVSS) to assess the severity level of vulnerabilities in combination with the actual impact of the vulnerability on the product, in order to determine the priority of vulnerability remediation and prioritize the handling of the vulnerability. Vulnerabilities are categorized into four levels: Critical, High, Medium, and Low. (The following is for reference and will be updated with industry standards)

Critical security issues:

Vulnerability-Rating-Criteria_05.png

High-risk security issues:
Medium-risk security issues:
01
Permission bypass vulnerabilities. This includes, but is not limited to, full bypass of kernel-level protections or exploiting vulnerabilities in mitigation techniques, local bypass of user-specific functionality requirements to restrict modifications to any developer or to any security settings, and full bypass of application-isolated operating system protections.
02
Local overstepping operation vulnerabilities. Including, but not limited to, local bypassing the need for user-initiated or obtain user permission before the use of functional restrictions, the vulnerability of overstepping sensitive operations.
03
Privilege bypass vulnerabilities. Including, but not limited to, comprehensive and in-depth bypassing the user-level protection function, or in the privileged process to take advantage of the vulnerability of the existence of mitigation techniques, bypassing the device protection function/restore the factory settings protection function vulnerability.
04
Remote override access to common information vulnerability. Common information includes, but is not limited to, data that is normally accessible to all locally installed applications.
05
Sensitive information leakage. Including, but not limited to, obtaining important keys, passwords, Secret and other available data in the system through reverse, network hijacking, source code and other means.
Low-risk security issues:

Sensitive information leakage. Including, but not limited to, obtaining important keys, passwords, Secret and other available data in the system through reverse, network hijacking, source code and other means.

Local override vulnerabilities. Including, but not limited to, without user interaction, call the system's hidden functions, the user's use of the vulnerability caused by the actual difficulties or actual damage occurred.

Vulnerability-Rating-Criteria_09.png

Vulnerability-Rating-Criteria_12.png

The following issues are not included:
Bugs that do not involve security issues, including but not limited to product functionality defects, web page garbage, style confusion, static file directory traversal, application compatibility and other issues.
Unexploitable vulnerabilities. CSRF without sensitive operations, meaningless leakage of anomalous information, leakage of intranet IP address/domain name.
Other issues that do not directly reflect the existence of vulnerabilities. Including, but not limited to, purely user speculation.