Level |
Severity |
Description |
5 |
Urgent
|
Intruders can easily gain
control of the host, which can lead to the
compromise of your entire network security. For
example, vulnerabilities at this level may include
full read and write access to files, remote
execution of commands, and the presence of
backdoors.
|
4 |
Critical
|
Intruders can possibly gain
control of the host, or there may be potential
leakage of highly sensitive information. For
example, vulnerabilities at this level may include
full read access to files, potential backdoors, or
a listing of all the users on the host.
|
3 |
Serious
|
Intruders may be able to gain
access to specific information stored on the host,
including security settings. This could result in
potential misuse of the host by intruders. For
example, vulnerabilities at this level may include
partial read of certain files, directory browsing,
disclosure of filtering rules and security
mechanisms, denial of service attacks, and
unauthorized use of services, such as
mail-relaying.
|
2 |
Medium |
Intruders may be able to
collect sensitive information from the host, such
as the precise version of software installed. With
this information, intruders can easily exploit
known vulnerabilities specific to software
versions.
|
1 |
Minimal
|
Intruders can collect
information about the host (open ports, services,
etc.) and may be able to use this information to
find other vulnerabilities.
|
List of vulnerabilities
For information regarding fees, please call Kinney Williams at 806-798-7119
or send him an email at examiner@yennik.com.
|