Standard View

The Standard View displays the vulnerability categories with the Denial of Service exploits first, followed by the remaining vulnerability categories (without the Denial of Service exploits) listed in the Standard folder.

Denial of service icons

The Policy Editor uses the following icons to distinguish the denial of service exploits for each vulnerability category. A vulnerability category can display the following icons (if denial of service exploits are present), in addition to the regular risk level icons.

Denial of Service Icon

Risk Level

 

Description

 

High

 

Any vulnerability that allows an attacker to gain immediate access into a machine, to gain superuser access, or to bypass a firewall. Example: A vulnerable Sendmail 8.6.5 version that allows an intruder to execute commands on mail server.

Medium

 

Any vulnerability that provides information, degrades performance, or has a high potential of giving system access to an intruder. Examples: The Data Flood denial of service exploit, or a misconfigured TFTP or vulnerable NIS server that allows an intruder to get the password file that could contain an account with a guessable password.

Low

Any vulnerability that provides information that could potentially lead to a compromise. Example: A finger that allows an intruder to find out who is online and potential accounts to attempt to crack passwords via brute force methods.