Previous Topic: Source Disclosure Attack ActionNext Topic: Remote Exploit Action


E-Mail Exploit Action

The E-Mail Exploit action involves event information involving the detection of exploits in an email system.

Information

Level

Source - User Information

Secondary

Source - Host Information

Tertiary

Source - Object Information

Tertiary

Source - Process Information

Tertiary

Source - Group Information

Tertiary

Dest - User Information

Tertiary

Dest - Host Information

Primary

Dest - Object Information

Primary

Dest - Group Information

Tertiary

Agent - Information

Primary

Agent - Host Information

Primary

Event Source - Host Information

Primary

Event Source - Information

Tertiary

Event - Information

Primary

Result - Information

Primary

Result

event_result

event_severity

Success

S

3

Failure

F

3