Vulnerability Assessment
Systematically assess found vulnerabilities.
Categories
| Category | Description |
|---|---|
| Authentication | Missing/weak auth |
| Encryption | Crypto weaknesses |
| Authorization | Access controls |
| Privacy | Data leaks |
Next Step
Continue with CVSS Scoring.