Weakness Name | Source | |
---|---|---|
Category : Permissions, Privileges, and Access Controls Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control. |
Metrics | Score | Severity | CVSS Vector | Source |
---|---|---|---|---|
V2 | 4.3 | AV:N/AC:M/Au:N/C:N/I:P/A:N | nvd@nist.gov |
Bestpractical>>Request_tracker >> Version 3.8.3
Bestpractical>>Request_tracker >> Version 3.8.4
Bestpractical>>Request_tracker >> Version 3.8.7
Bestpractical>>Request_tracker >> Version 3.8.9
Bestpractical>>Request_tracker >> Version 3.8.10
Bestpractical>>Request_tracker >> Version 3.8.11
Bestpractical>>Request_tracker >> Version 3.8.12
Bestpractical>>Request_tracker >> Version 3.8.13
Bestpractical>>Request_tracker >> Version 3.8.14
Bestpractical>>Request_tracker >> Version 4.0.0
Bestpractical>>Request_tracker >> Version 4.0.1
Bestpractical>>Request_tracker >> Version 4.0.2
Bestpractical>>Request_tracker >> Version 4.0.3
Bestpractical>>Request_tracker >> Version 4.0.4
Bestpractical>>Request_tracker >> Version 4.0.5
Bestpractical>>Request_tracker >> Version 4.0.6
Bestpractical>>Request_tracker >> Version 4.0.7