Processing Workflow
Processing Workflow
EulerOS Security provides objective information about security risks that affect you. We use the following workflow to communicate accurate information about how these vulnerabilities affect you, so you can make informed decisions.
EulerOS Security provides objective information about security risks that affect you. We use the following workflow to communicate accurate information about how these vulnerabilities affect you, so you can make informed decisions.
Terms & Conditions
活动对象:华为云电销客户及渠道伙伴客户可参与消费满送活动,其他客户参与前请咨询客户经理
活动时间: 2020年8月12日-2020年9月11日
CVSS V3 Score | Severity Rating | Description |
---|---|---|
9~10 | Critical impact | This rating is given to flaws that could be easily exploited by a remote unauthenticated attacker and lead to system compromise (arbitrary code execution) without requiring user interaction. These are the types of vulnerabilities that can be exploited by worms. Flaws that require an authenticated remote user, a local user, or an unlikely configuration are not classed as Critical impact. |
7~8.9 | Important impact | This rating is given to flaws that can easily compromise the confidentiality, integrity, or availability of resources. These are the types of vulnerabilities that allow local users to gain privileges, allow unauthenticated remote users to view resources that should otherwise be protected by authentication, allow authenticated remote users to execute arbitrary code, or allow remote users to cause a denial of service. |
4~6.9 | Moderate impact | This rating is given to flaws that may be more difficult to exploit but could still lead to some compromise of the confidentiality, integrity, or availability of resources, under certain circumstances. These are the types of vulnerabilities that could have had a Critical impact or Important impact but are less easily exploited based on a technical evaluation of the flaw, or affect unlikely configurations. |
0~3.9 | Low impact | This rating is given to all other issues that have a security impact. These are the types of vulnerabilities that are believed to require unlikely circumstances to be able to be exploited, or where a successful exploit would give minimal consequences. |