Severity Levels of RPM Vulnerabilities

JFrog Security Documentation

ft:sourceType
Paligo

This topic reviews information about severity levels of RPM vulnerabilities. For for information on determining severity levels for Operating System packages, see Determine the Issue Severity Level for Operating Systems Packages.

Vulnerabilities source: Red Hat Security Advisories and CVE database

Severity mapped from: Severity Rating

Red Hat Severity to Severity mapping:

Red Hat Severity

Xray Severity

Critical

High

Important

High

Moderate

Medium

Low

Low

Red Hat Severity to Severity mapping: CVSS v3

Red Hat Severity

Xray Severity

Critical

Critical

Important

High

Moderate

Medium

Low

Low