Weakness Name | Source | |
---|---|---|
Category : Permissions, Privileges, and Access Controls Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control. |
Metrics | Score | Severity | CVSS Vector | Source |
---|---|---|---|---|
V2 | 6.8 | AV:N/AC:M/Au:N/C:P/I:P/A:P | nvd@nist.gov |
Redhat>>Icedtea-web >> Version To (including) 1.0.3
Redhat>>Icedtea-web >> Version 1.0
Redhat>>Icedtea-web >> Version 1.0.1
Redhat>>Icedtea-web >> Version 1.0.2
Redhat>>Icedtea-web >> Version 1.1
Redhat>>Icedtea6 >> Version To (including) 1.8.8
Redhat>>Icedtea6 >> Version 1.8
Redhat>>Icedtea6 >> Version 1.8.1
Redhat>>Icedtea6 >> Version 1.8.2
Redhat>>Icedtea6 >> Version 1.8.3
Redhat>>Icedtea6 >> Version 1.8.4
Redhat>>Icedtea6 >> Version 1.8.5
Redhat>>Icedtea6 >> Version 1.8.6
Redhat>>Icedtea6 >> Version 1.8.7
Redhat>>Icedtea6 >> Version 1.9.1
Redhat>>Icedtea6 >> Version 1.9.2
Redhat>>Icedtea6 >> Version 1.9.3
Redhat>>Icedtea6 >> Version 1.9.4
Redhat>>Icedtea6 >> Version 1.9.5
Redhat>>Icedtea6 >> Version 1.9.6
Redhat>>Icedtea6 >> Version 1.9.7
Redhat>>Icedtea6 >> Version 1.9.8