Weakness Name | Source | |
---|---|---|
Category : Permissions, Privileges, and Access Controls Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control. |
Metrics | Score | Severity | CVSS Vector | Source |
---|---|---|---|---|
V2 | 8.5 | AV:N/AC:M/Au:S/C:C/I:C/A:C | [email protected] |
Microsoft>>Windows >> Version *
Ibm>>Db2 >> Version 8.0
Ibm>>Db2 >> Version 8.0
Ibm>>Db2 >> Version 8.0
Ibm>>Db2 >> Version 8.0
Ibm>>Db2 >> Version 8.0
Ibm>>Db2 >> Version 8.0
Ibm>>Db2 >> Version 8.0
Ibm>>Db2 >> Version 8.0
Ibm>>Db2 >> Version 8.0
Ibm>>Db2 >> Version 8.0
Ibm>>Db2 >> Version 8.0
Ibm>>Db2 >> Version 8.0
Ibm>>Db2 >> Version 8.0
Ibm>>Db2 >> Version 8.0
Ibm>>Db2 >> Version 8.0
Ibm>>Db2 >> Version 8.0
Ibm>>Db2 >> Version 8.0
Ibm>>Db2 >> Version 8.0
Ibm>>Db2 >> Version 8.0
Ibm>>Db2 >> Version 8.0
Ibm>>Db2 >> Version 8.0
Ibm>>Db2 >> Version 8.0
Ibm>>Db2 >> Version 9.1
Ibm>>Db2 >> Version 9.1
Ibm>>Db2 >> Version 9.1
Ibm>>Db2 >> Version 9.1
Ibm>>Db2 >> Version 9.1
Ibm>>Db2 >> Version 9.5