Basic Documentation

SCF 10/2014 V13.06 Page 3 of 5
_
Overview by Categories
Vulnerability Criticality
Information Gathering
none
Configuration and Deployment Management low
Configuration and Deployment Management information
Identity Management none
Authentication information
Authorization none
Session Management medium
Input Validation none
Error Handling none
Weak Cryptography information
Business Logic medium
Client none