skip to Main Content
Researcher Portal
Customer Portal
Why Bugcrowd
Explore The Platform
How it Works
The Bugcrowd Difference
Platform Overview
Integrations
Vulnerability Rating Taxonomy
Products
What We Offer
Penetration Testing
Pen Test as a Service
Web Application Pen Test
Mobile App Pen Test
Network Pen Test
API Pen Test
IoT Pen Test
Cloud Pen Test
Bug Bounty
Vulnerability Disclosure
Attack Surface Management
Bug Bash
Solutions
By Industry
Financial Services
Healthcare
Retail
Automotive
Technology
Industry
Government
Security
Marketplace Apps
Mergers & Acquisitions
Researchers
Hack With Us
Programs
CrowdStream
Bug Bounty List
Start Hacking
Help Wanted
Learn With Us
Researcher Docs
Bugcrowd University
Community
Leaderboard
Programs
Resources
Resource Library
Resources
Case Studies
Webinars
Events
Glossary
FAQ
Company
About
About Us
Customers
Leadership
Careers
Diversity and Inclusion
Expertise
Partners
News & Press
Blog
Press Releases
News
Contact Us
Get Started
Contact Us
Researcher Portal
Customer Portal
Open Mobile Menu
Request a Demo
Contact Us
This website use cookies which are necessary to its functioning and required to achieve the purposes illustrated in the
privacy policy
. To learn more or withdraw consent please click on Learn More.
By continued use of this website you are consenting to our use of cookies.
Accept
Learn More
Cookie Settings
Operationally Necessary Cookies
Operationally necessary cookies are necessary to the operation of our sites, services, applications, and tools. These can not be disabled.
Analytics Cookies
Analytics cookies help us understand how visitors interact with websites by collecting and reporting information anonymously.
Advertising Cookies
Advertising cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user based on interest and usefulness.
Submit
x
GLOSSARY
Vulnerability Priority
P1 – Critical: Vulnerabilities that cause a privilege escalation from unprivileged to admin or allow for remote code execution, financial theft, etc.
P2 – High: Vulnerabilities that affect the security of the software and impact the processes it supports.
P3 – Medium: Vulnerabilities that affect multiple users and require little or no user interaction to trigger.
P4 – Low: Vulnerabilities that affect singular users and require interaction or significant prerequisites to trigger (MitM).
P5 – Informational: Non-exploitable vulnerabilities in functionality. Vulnerabilities that are by design or are deemed acceptable business risk to the customer.
next post:
Crowdsourced Security (CSS)