Weakness Name | Source | |
---|---|---|
Category : Configuration Weaknesses in this category are typically introduced during the configuration of the software. |
||
Category : Permissions, Privileges, and Access Controls Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control. |
Metrics | Score | Severity | CVSS Vector | Source |
---|---|---|---|---|
V2 | 2.1 | AV:N/AC:H/Au:S/C:N/I:P/A:N | nvd@nist.gov |
Mit>>Kerberos_5 >> Version 1.7