Weakness Name | Source | |
---|---|---|
Improper Access Control The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Metrics | Score | Severity | CVSS Vector | Source |
---|---|---|---|---|
V2 | 6.4 | AV:N/AC:L/Au:N/C:P/I:P/A:N | nvd@nist.gov |
Fedoraproject>>Fedora >> Version 21
Fedoraproject>>Fedora >> Version 22
Bestpractical>>Request_tracker >> Version To (including) 4.0.22
Bestpractical>>Request_tracker >> Version 4.2.0
Bestpractical>>Request_tracker >> Version 4.2.1
Bestpractical>>Request_tracker >> Version 4.2.2
Bestpractical>>Request_tracker >> Version 4.2.3
Bestpractical>>Request_tracker >> Version 4.2.4
Bestpractical>>Request_tracker >> Version 4.2.5
Bestpractical>>Request_tracker >> Version 4.2.6
Bestpractical>>Request_tracker >> Version 4.2.7
Bestpractical>>Request_tracker >> Version 4.2.8
Bestpractical>>Request_tracker >> Version 4.2.9