Weakness Name | Source | |
---|---|---|
Category : Permissions, Privileges, and Access Controls Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control. |
Metrics | Score | Severity | CVSS Vector | Source |
---|---|---|---|---|
V2 | 5.8 | AV:N/AC:M/Au:N/C:P/I:P/A:N | nvd@nist.gov |
Ibm>>Lotus_notes >> Version 8.0
Ibm>>Lotus_notes >> Version 8.0.0
Ibm>>Lotus_notes >> Version 8.0.1
Ibm>>Lotus_notes >> Version 8.0.2
Ibm>>Lotus_notes >> Version 8.0.2.0
Ibm>>Lotus_notes >> Version 8.0.2.1
Ibm>>Lotus_notes >> Version 8.0.2.2
Ibm>>Lotus_notes >> Version 8.0.2.3
Ibm>>Lotus_notes >> Version 8.0.2.4
Ibm>>Lotus_notes >> Version 8.0.2.5
Ibm>>Lotus_notes >> Version 8.0.2.6
Ibm>>Lotus_notes >> Version 8.5
Ibm>>Lotus_notes >> Version 8.5.0.0
Ibm>>Lotus_notes >> Version 8.5.0.1
Ibm>>Lotus_notes >> Version 8.5.1
Ibm>>Lotus_notes >> Version 8.5.1.0
Ibm>>Lotus_notes >> Version 8.5.1.1
Ibm>>Lotus_notes >> Version 8.5.1.2
Ibm>>Lotus_notes >> Version 8.5.1.3
Ibm>>Lotus_notes >> Version 8.5.1.4
Ibm>>Lotus_notes >> Version 8.5.1.5
Ibm>>Lotus_notes >> Version 8.5.2.0
Ibm>>Lotus_notes >> Version 8.5.2.1
Ibm>>Lotus_notes >> Version 8.5.2.2
Ibm>>Lotus_notes >> Version 8.5.2.3
Ibm>>Lotus_notes >> Version 8.5.3
Ibm>>Lotus_notes >> Version 8.5.3.1
Ibm>>Lotus_notes >> Version 8.5.3.2
Ibm>>Lotus_notes >> Version 8.5.3.3
Ibm>>Lotus_notes >> Version 9.0.0.0