Previous Topic: Service-Daemon Vulnerability ActionNext Topic: Software Vulnerability Action


SMTP Vulnerability Action

The SMTP Vulnerability action expresses event information about the discovery of vulnerabilities related to SMTP. For example, an open SMTP relay that can permit anyone on the internet to send e-mail through the mail server.

Information

Level

Source - User Information

Secondary

Source - Host Information

Secondary

Source - Object Information

Tertiary

Source - Process Information

Tertiary

Source - Group Information

Tertiary

Dest - User Information

Tertiary

Dest - Host Information

Primary

Dest - Object Information

Primary

Dest - Group Information

Tertiary

Agent - Information

Primary

Agent - Host Information

Primary

Event Source - Host Information

Primary

Event Source - Information

Tertiary

Event - Information

Primary

Result - Information

Primary

Result

event_result

event_severity

Success

S

4