The Risk View displays the vulnerability categories according to risk level (high, medium, or low).
Risk Level |
Icon |
Description |
High |
|
Any vulnerability that allows an attacker to gain immediate access into a machine, to gain superuser access, or to bypass a firewall. Example: A vulnerable Sendmail 8.6.5 version that allows an intruder to execute commands on mail server. |
Denial of Service-High |
|
|
Medium |
|
Any vulnerability that provides information, degrades performance, or has a high potential of giving system access to an intruder. Examples: The Data Flood denial of service exploit, or a misconfigured TFTP or vulnerable NIS server that allows an intruder to get the password file that could contain an account with a guessable password. |
Denial of Service-Medium |
|
|
Low |
|
Any vulnerability that provides information that could potentially lead to a compromise. Example: A finger that allows an intruder to find out who is online and potential accounts to attempt to crack passwords via brute force methods. |
Denial of Service-Low |
|