Web Application Vulnerabilities Severities Explained

Category: Product Docs & FAQS - Last Updated: Tue, 24 Oct 2017 - by Selçuk Miynat

What Are Vulnerability Severities?

Netsparker web application security scanner scans for a wide variety of vulnerabilities in websites, web applications and web services.

Each vulnerability has a different impact; some need to be addressed urgently, while others are less of a priority. For example, a SQL Injection vulnerability should definitely be prioritized over an Internal IP address disclosure.

To help you better decide which vulnerabilities should be fixed first, Netsparker categorizes them in its scans and reports. This article defines the following types of vulnerabilities:

  • Critical
  • High
  • Medium
  • Low

In addition, there are Informational Alerts. For further information, see our full list of web vulnerability checks.

Table Of Contents

  1. Critical Severity Web Vulnerabilities
  2. High Severity Web Application Vulnerabilities
  3. Medium Severity Web Vulnerabilities
  4. Low Severity Web Vulnerabilities
  5. Informational Alerts

Critical Severity Web Vulnerabilities

This section explains how we define and identify web vulnerabilities of Critical severity.

Critical Severity Example

This is what a report of a Critical severity vulnerability looks like in Netsparker web application security scanner.

Critical Severity Example

Impacts of Critical Severity Web Application Vulnerabilities

The impacts of Critical severity vulnerabilities are as follows:

  1. These vulnerabilities can allow attackers to take complete control of your web applications and web servers. In exploiting this type of vulnerability, attackers could carry out a range of malicious acts including (but not limited to):
    • Stealing information (for example, user data)
    • Tricking your users into supplying them with sensitive information (for example, credit card details)
    • Defacing your website

  1. By exploiting a critical severity vulnerability, attackers can access your web application's database. This allows them to acquire user and administrator information that might allow them to make changes such as delete or modify other user accounts.
  2. On exploiting such vulnerabilities, attackers can access and control logged-in user or administrator accounts, enabling them to hijack accounts and make changes that typically only those users can.

Suggested Action for Critical Severity Vulnerabilities

A Critical severity vulnerability means that your website can be hacked any time. You should make it your highest priority to fix these vulnerabilities immediately. Once you fix them, rescan the website to make sure they have been eliminated.

High Severity Web Application Vulnerabilities

This section explains how we define and identify web vulnerabilities of High severity.

High Severity Example

This is what a report of an High severity vulnerability looks like in Netsparker.

High Severity Example

Impacts of High Severity Vulnerabilities

  1. Attackers can find other vulnerabilities, and potentially your database passwords, by viewing your application's source code.
  2. On exploiting such vulnerabilities, attackers can view information about your system that helps them find or exploit other vulnerabilities that enable them to take control of your website and access sensitive user and administrator information.

Suggested Action for High Severity Vulnerabilities

High severity vulnerability means that your website can be hacked and hackers can find other vulnerabilities which have a bigger impact. Fix these types of vulnerabilities immediately. Once you fix them, rescan your website to make sure they have been eliminated.

Medium Severity Web Vulnerabilities

This section explains how we define and identify web vulnerabilities of Medium severity.

Medium Severity Example

This is what a report of a Medium severity vulnerability looks like in Netsparker.

Medium Severity Example

Impacts of Medium Severity Vulnerabilities

  1. Attackers can access a logged-in user account to view sensitive content.
  2. By exploiting these security issues, attackers can access to information that helps them exploit other vulnerabilities, or better understand your system so they can refine their attacks.

Suggested Action for Medium Severity Vulnerabilities

Most of the time, since the impact of Medium severity vulnerabilities is not direct, you should first focus on fixing Critical and High severity vulnerabilities. However, Medium severity vulnerabilities should still be addressed at the earliest possible opportunity

Low Severity Web Vulnerabilities

This section explains how we define and identify web vulnerabilities of Low severity.

Low Severity Example

This is what a report of a Low severity vulnerability looks like in Netsparker.

Low Severity Example

Impacts of Low Severity Vulnerabilities

Do not overly concern yourself if your website has low severity vulnerabilities. These types of issues do not have any significant impact and are not exploitable.

Suggested Action For Low Severity Vulnerabilities

If time and budget allows, it is worth investigating and fixing Low severity vulnerabilities.

Informational Alerts

This section explains how we define and use Informational Alerts.

Informational Alerts

Impacts of Informational Alerts

We do not even call these alerts vulnerabilities. They are reported simply for your information as a website owner.

Suggested Action for Informational Alerts

No action or fix is required. It is just sometimes good to know about things that are on your web application such as: NTLM Authorization Required, Database Detected (MySQL), Robots.txt Detected, phpMyAdmin Detected or Out-of-date Version (jQuery).


Netsparker

Dead accurate, fast & easy-to-use Web Application Security Scanner

DOWNLOAD DEMO TRY ONLINE SCAN