Wiseep VR Taxonomy

Take a look points we care about

Wiseep allows customers to learn and fix their all type of risky vulnerabilities in an easy and affordable way. We do all checks following our latest vulnerability rating taxonomy.

Wiseep Vulnerability Taxonomy
Vulnerability Severity Category Origin
Remote Code Execution (RCE) P1 - Critical Input Validation Developer Awareness
Sql Injection P1 - Critical Input Validation Developer Awareness
Local File Inclusion (LFI) P1 - Critical Input Validation Developer Awareness
Remote File Inclusion (RFI) P1 - Critical Input Validation Developer Awareness
Default Credential Usage P1 - Critical Authentication Admin Awareness
Unauthenticated Access P1 - Critical Authentication Developer Awareness
Hardcoded Password P1 - Critical Insecure Storage Policy Decision
Code Injection P1 - Critical Input Validation Developer Awareness
Disclosure of Secrets P1 - Critical Information Leak Developer Awareness
Webshell via File Upload P1 - Critical Input Validation Developer Awareness
Authentication Bypass P1 - Critical Authentication Business Logic
Vertical Privilege Escalation P1 - Critical Authorization Developer Awareness
Horizontal Privilege Escalation P1 - Critical Authorization Developer Awareness
Command Injection P1 - Critical Input Validation Developer Awareness
XML External Entity Injection P1 - Critical Input Validation Developer Awareness
Insecure Direct Object Reference(IDOR) P1 - Critical Broken Access Control Developer Awareness
Predictable Service Credential Usage P1 - Critical Authentication Admin Awareness
Authorization Bypass P1 - Critical Authorization Developer Awareness
Exploitable Lack of Update Issue P1 - Critical Update Management Process Failure
Stored Cross Site Scripting P2 - High Input Validation Developer Awareness
Subdomain Takeover P2 - High Configuration Management Admin Awareness
Dangerous HTTP Method(PUT) Usage P2 - High Configuration Management Developer Awareness
Web Cache Poisoning P2 - High Deploy Configuration Admin Awareness
Server-Side Request Forgery - SSRF P2 - High Input Validation Developer Awareness
Insecure Direct Object Reference(IDOR) P2 - High Broken Access Control Developer Awareness
Default Credential Usage P2 - High Authentication Developer Awareness
Application Level Denial of Service P2 - High Business Logic Developer Awareness
Session Leak via Accessible Elmah.axd P2 - High Session Management Developer Awareness
Oath Account Takeover P2 - High Configuration Management Developer Awareness
Token Leakage Issue P2 - High Business Logic Developer Awareness
Sensitive Cross-Site Request Forgery (CSRF) P2 - High Authentication Developer Awareness
Stored Sensitive Data in Mobile App P2 - High Information Leak Policy Decision
Session Leak via Accessible Trace.axd P2 - High Session Management Developer Awareness
Second Factor Auth Bypass P2 - High Session Management Developer Awareness
Stored Sensitive Data in Source Code P2 - High Information Leak Policy Decision
Reflected Cross Site Scripting (RXSS) P3 - Medium Input Validation Developer Awareness
CRLF Injection P3 - Medium Input Validation Developer Awareness
Internal Scan SSRF P3 - Medium Input Validation Developer Awareness
Login Form without Rate Limit P3 - Medium Authentication Developer Awareness
Disclosure of Internal Secrets P3 - Medium Information Leakage Process Failure
Simple Subdomain Takeover P3 - Medium Configuration Management Admin Awareness
HTML Code Injection P3 - Medium Input Validation Developer Awareness
Session Fixation P3 - Medium Session Management Developer Awareness
Medium Level IDOR Issue P3 - Medium Session Management Developer Awareness
Lack of Spoofing Protection P3 - Medium Configuration Management Admin Awareness
Sensitive User Enumeration P3 - Medium Identity Management Developer Awareness
Cross Site Request Forgery(CSRF) P3 - Medium Session Management Developer Awareness
Unauthorised Access P3 - Medium Session Management Developer Awareness
Sensitive Directory Listing P3 - Medium Deploy Management Developer Awareness
LDAP Injection P3 - Medium Input Validation Developer Awareness
XPath Injection P3 - Medium Input Validation Developer Awareness
Open URL Redirection P4 - Low Input Validation Developer Awareness
Cleartext Credential Submission via HTTP P4 - Low Configuration Management Developer Awareness
Unauthorised Directory Listing P4 - Low Configuration Management Admin Awareness
Zone Transfer Issue P4 - Low Configuration Management Admin Awareness
Privileged Database User Usage P4 - Low Configuration Management Policy Decision
External Server-Side Request Forgery P4 - Low Input validation Developer Awareness
Registration Form without Rate Limit P4 - Low Business Logic Developer Awareness
Email triaging without Rate Limit P4 - Low Business Logic Developer Awareness
SMS triaging without Rate Limit P4 - Low Business Logic Developer Awareness
Password Reset Token Submission to 3rd Parties P4 - Low Business Logic Developer Awareness
Web Application Firewall Bypass P4 - Low Configuration Management Admin Awareness
External Authentication Injection P4 - Low Input validation Developer Awareness
Open Mail Relay P4 - Low Configuration Management Developer Awareness
Delete Account without Confirm P4 - Low Business Logic Developer Awareness
Clickjacking on Sensitive Functions P4 - Low Session Management Developer Awareness
Logout Function not working properly P4 - Low Session Management Developer Awareness
Unauthorised accessible data P4 - Low Authentication Developer Awareness