Weakness Name | Source | |
---|---|---|
Category : Permissions, Privileges, and Access Controls Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control. |
Metrics | Score | Severity | CVSS Vector | Source |
---|---|---|---|---|
V2 | 6.8 | AV:N/AC:M/Au:N/C:P/I:P/A:P | [email protected] |
Redhat>>Icedtea >> Version 1.7
Redhat>>Icedtea >> Version 1.7.1
Redhat>>Icedtea >> Version 1.7.2
Redhat>>Icedtea >> Version 1.7.3
Redhat>>Icedtea >> Version 1.7.4
Redhat>>Icedtea >> Version 1.7.5
Redhat>>Icedtea >> Version 1.7.6
Redhat>>Icedtea >> Version 1.8
Redhat>>Icedtea >> Version 1.8.1
Redhat>>Icedtea >> Version 1.8.2
Redhat>>Icedtea >> Version 1.8.3
Redhat>>Icedtea >> Version 1.9
Redhat>>Icedtea >> Version 1.9.1
Redhat>>Icedtea >> Version 1.9.2
Redhat>>Icedtea >> Version 1.9.3
Sun>>Openjdk >> Version *