Weakness Name | Source | |
---|---|---|
Category : Permissions, Privileges, and Access Controls Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control. |
Metrics | Score | Severity | CVSS Vector | Source |
---|---|---|---|---|
V2 | 8.5 | AV:N/AC:L/Au:N/C:N/I:P/A:C | [email protected] |
Rsyslog>>Rsyslog >> Version 3.12.1
Rsyslog>>Rsyslog >> Version 3.12.2
Rsyslog>>Rsyslog >> Version 3.12.3
Rsyslog>>Rsyslog >> Version 3.12.4
Rsyslog>>Rsyslog >> Version 3.12.5
Rsyslog>>Rsyslog >> Version 3.13.0
Rsyslog>>Rsyslog >> Version 3.15.0
Rsyslog>>Rsyslog >> Version 3.15.1
Rsyslog>>Rsyslog >> Version 3.17.0
Rsyslog>>Rsyslog >> Version 3.17.1
Rsyslog>>Rsyslog >> Version 3.17.4
Rsyslog>>Rsyslog >> Version 3.17.5
Rsyslog>>Rsyslog >> Version 3.19.0
Rsyslog>>Rsyslog >> Version 3.19.1
Rsyslog>>Rsyslog >> Version 3.19.2
Rsyslog>>Rsyslog >> Version 3.19.3
Rsyslog>>Rsyslog >> Version 3.19.4
Rsyslog>>Rsyslog >> Version 3.19.5
Rsyslog>>Rsyslog >> Version 3.19.6
Rsyslog>>Rsyslog >> Version 3.19.7
Rsyslog>>Rsyslog >> Version 3.19.8
Rsyslog>>Rsyslog >> Version 3.19.9
Rsyslog>>Rsyslog >> Version 3.19.10
Rsyslog>>Rsyslog >> Version 3.19.11
Rsyslog>>Rsyslog >> Version 3.19.12
Rsyslog>>Rsyslog >> Version 3.20.0
Rsyslog>>Rsyslog >> Version 4.1.0
Rsyslog>>Rsyslog >> Version 4.1.1