Weakness Name | Source | |
---|---|---|
Category : Permissions, Privileges, and Access Controls Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control. |
Metrics | Score | Severity | CVSS Vector | Source |
---|---|---|---|---|
V2 | 6.9 | AV:L/AC:M/Au:N/C:C/I:C/A:C | [email protected] |
Linux>>Linux_kernel >> Version From (including) 2.6.12 To (excluding) 3.2.69
Linux>>Linux_kernel >> Version From (including) 3.3 To (excluding) 3.4.108
Linux>>Linux_kernel >> Version From (including) 3.5 To (excluding) 3.10.75
Linux>>Linux_kernel >> Version From (including) 3.11 To (excluding) 3.12.41
Linux>>Linux_kernel >> Version From (including) 3.13 To (excluding) 3.14.39
Linux>>Linux_kernel >> Version From (including) 3.15 To (excluding) 3.16.35
Linux>>Linux_kernel >> Version From (including) 3.17 To (excluding) 3.18.13
Linux>>Linux_kernel >> Version From (including) 3.19 To (excluding) 3.19.5
Canonical>>Ubuntu_linux >> Version 10.04
Canonical>>Ubuntu_linux >> Version 12.04
Canonical>>Ubuntu_linux >> Version 14.04
Canonical>>Ubuntu_linux >> Version 14.10
Debian>>Debian_linux >> Version 7.0
Debian>>Debian_linux >> Version 8.0