@@ -10,6 +10,72 @@ The format is based on [Keep a Changelog](http://keepachangelog.com/) and this p
10
10
11
11
### Changed
12
12
13
+ ## [ v1.11] ( https://github.com/bugcrowd/vulnerability-rating-taxonomy/compare/v1.10...v1.11 ) - 2023-11-20
14
+ ### Added
15
+ - Sensitive Data Exposure - Disclosure of Secrets - PII Leakage/Exposure: VARIES
16
+ - Sensitive Data Exposure - Disclosure of Secrets - Sensitive data Leakage/Exposure: P1
17
+ - Server-Side Injection - Content Spoofing - HTML Content Injection: P5
18
+ - Broken Authentication and Session Management - Failure to invalidate session - Permission change: VARIES
19
+ - Server Security Misconfiguration - Request Smuggling: VARIES
20
+ - Cryptographic Weakness - Insufficient Entropy - Limited Random Number Generator (RNG) Entropy Source: P4
21
+ - Cryptographic Weakness - Insufficient_Entropy - Use of True Random Number Generator (TRNG) for Non-Security Purpose: P5
22
+ - Cryptographic Weakness - Insufficient_Entropy - Pseudo-Random Number Generator (PRNG) Seed Reuse: P5
23
+ - Cryptographic Weakness - Insufficient_Entropy - Predictable Pseudo-Random Number Generator (PRNG) Seed: P4
24
+ - Cryptographic Weakness - Insufficient_Entropy - Small Seed Space in Pseudo-Random Number Generator (PRNG): P4
25
+ - Cryptographic Weakness - Insufficient_Entropy - Initialization Vector (IV) Reuse: P5
26
+ - Cryptographic Weakness - Insufficient_Entropy - Predictable Initialization Vector (IV): P4
27
+ - Cryptographic Weakness - Insecure Implementation - Missing Cryptographic Step: VARIES
28
+ - Cryptographic Weakness - Insecure Implementation - Improper Following of Specification (Other): VARIES
29
+ - Cryptographic Weakness - Weak Hash - Lack of Salt: VARIES
30
+ - Cryptographic Weakness - Weak Hash - Use of Predictable Salt: P5
31
+ - Cryptographic Weakness - Weak Hash - Predictable Hash Collision: VARIES
32
+ - Cryptographic Weakness - Insufficient Verification of Data Authenticity - Integrity Check Value (ICV): P4
33
+ - Cryptographic Weakness - Insufficient Verification of Data Authenticity - Cryptographic Signature: VARIES
34
+ - Cryptographic Weakness - Insecure Key Generation - Improper Asymmetric Prime Selection: VARIES
35
+ - Cryptographic Weakness - Insecure Key Generation - Improper Asymmetric Exponent Selection: VARIES
36
+ - Cryptographic Weakness - Insecure Key Generation - Insufficient Key Stretching: VARIES
37
+ - Cryptographic Weakness - Insecure Key Generation - Insufficient Key Space: P3
38
+ - Cryptographic Weakness - Insecure Key Generation - Key Exchage Without Entity Authentication: P3
39
+ - Cryptographic Weakness - Key Reuse - Lack of Perfect Forward Secrecy: P4
40
+ - Cryptographic Weakness - Key Reuse - Intra-Environment: P5
41
+ - Cryptographic Weakness - Key Reuse - Inter-Environment: P2
42
+ - Cryptographic Weakness - Side-Channel Attack - Padding Oracle Attack: P4
43
+ - Cryptographic Weakness - Side-Channel Attack - Timing Attack: P4
44
+ - Cryptographic Weakness - Side-Channel Attack - Power Analysis Attack: P5
45
+ - Cryptographic Weakness - Side-Channel Attack - Emanations Attack: P5
46
+ - Cryptographic Weakness - Side-Channel Attack - Differential Fault Analysis: VARIES
47
+ - Cryptographic Weakness - Use of Expired Cryptographic Key (or Certificate): P4
48
+ - Cryptographic Weakness - Incomplete Cleanup of Keying Material: P5
49
+ - Cryptographic Weakness - Broken Cryptography - Use of Broken Cryptographic Primitive: P3
50
+ - Cryptographic Weakness - Broken Cryptography - Use of Vulnerable Cryptographic Library: P4
51
+ - Broken Access Control (BAC) - Insecure Direct Object References (IDOR) - Manipulate Non-Sensitive Information: P5
52
+ - Broken Access Control (BAC) - Insecure Direct Object References (IDOR) - Manipulate Sensitive Information | GUID/Complex Object Identifiers: P4
53
+ - Broken Access Control (BAC) - Insecure Direct Object References (IDOR) - Read Sensitive Information | Iteratable Object Identifiers: P3
54
+ - Broken Access Control (BAC) - Insecure Direct Object References (IDOR) - Alter Sensitive Information | Iteratable Object Identifiers: P2
55
+ - Broken Access Control (BAC) - Insecure Direct Object References (IDOR) - Read Sensitive Information (PII) | Iteratable Object Identifiers: P1
56
+
57
+ ### Changed
58
+ FROM:
59
+ - Cross-Site Scripting (XSS) - IE-Only - Older Version (< IE11): P5
60
+ TO:
61
+ - Cross-Site Scripting (XSS) - IE-Only: P5
62
+
63
+ - FROM:
64
+ - Broken Access Control (BAC) - Server-Side Request Forgery (SSRF) - Internal High Impact: P2
65
+ - Broken Access Control (BAC) - Server-Side Request Forgery (SSRF) - Internal Scan and/or Medium Impact: P3
66
+ - Broken Access Control (BAC) - Server-Side Request Forgery (SSRF) - External: P4
67
+ - Broken Access Control (BAC) - Server-Side Request Forgery (SSRF) - DNS Query Only : P5
68
+ TO:
69
+ - Server Security Misconfiguration - Server-Side Request Forgery (SSRF) - Internal High Impact: P2
70
+ - Server Security Misconfiguration - Server-Side Request Forgery (SSRF) - Internal Scan and/or Medium Impact: P3
71
+ - Server Security Misconfiguration - Server-Side Request Forgery (SSRF) - External - Low impact: P5
72
+ - Server Security Misconfiguration - Server-Side Request Forgery (SSRF) - External - DNS Query Only: P5
73
+
74
+ ### Removed
75
+ - Cross-Site Scripting (XSS) - IE-Only - IE11: P4
76
+ - Broken Cryptography - Cryptographic Flaw - Incorrect Usage: P1
77
+ - Automotive Security Misconfiguration - Infotainment, Radio Head Unit - PII Leakage: P1
78
+
13
79
## [ v1.10.1] ( https://github.com/bugcrowd/vulnerability-rating-taxonomy/compare/v1.10...v1.10.1 ) - 2021-03-29
14
80
### Changed
15
81
- renamed ` secure code warriors ` mapping to ` secure code warrior `
0 commit comments