Weakness Name | Source | |
---|---|---|
Category : Permissions, Privileges, and Access Controls Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control. |
Metrics | Score | Severity | CVSS Vector | Source |
---|---|---|---|---|
V2 | 5 | AV:N/AC:L/Au:N/C:P/I:N/A:N | [email protected] |
Trevor_mckay>>Cumin >> Version To (including) 0.1.5192-4
Trevor_mckay>>Cumin >> Version 0.1.3160-1
Trevor_mckay>>Cumin >> Version 0.1.4369-1
Trevor_mckay>>Cumin >> Version 0.1.4410-2
Trevor_mckay>>Cumin >> Version 0.1.4494-1
Trevor_mckay>>Cumin >> Version 0.1.4794-1
Trevor_mckay>>Cumin >> Version 0.1.4916-1
Trevor_mckay>>Cumin >> Version 0.1.5033-1
Trevor_mckay>>Cumin >> Version 0.1.5037-1
Trevor_mckay>>Cumin >> Version 0.1.5054-1
Trevor_mckay>>Cumin >> Version 0.1.5068-1
Trevor_mckay>>Cumin >> Version 0.1.5092-1
Trevor_mckay>>Cumin >> Version 0.1.5098-2
Trevor_mckay>>Cumin >> Version 0.1.5105-1
Trevor_mckay>>Cumin >> Version 0.1.5137-1
Trevor_mckay>>Cumin >> Version 0.1.5137-2
Trevor_mckay>>Cumin >> Version 0.1.5137-3
Trevor_mckay>>Cumin >> Version 0.1.5137-4
Trevor_mckay>>Cumin >> Version 0.1.5137-5
Trevor_mckay>>Cumin >> Version 0.1.5192-1
Redhat>>Enterprise_mrg >> Version 2.0