Weakness Name | Source | |
---|---|---|
Category : Permissions, Privileges, and Access Controls Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control. |
Metrics | Score | Severity | CVSS Vector | Source |
---|---|---|---|---|
V2 | 7.5 | AV:N/AC:L/Au:N/C:P/I:P/A:P | [email protected] |
Ibm>>Db2 >> Version 9.1
Ibm>>Db2 >> Version 9.1
Ibm>>Db2 >> Version 9.1
Ibm>>Db2 >> Version 9.1
Ibm>>Db2 >> Version 9.1
Ibm>>Db2 >> Version 9.1
Ibm>>Db2 >> Version 9.1
Ibm>>Db2 >> Version 9.1
Ibm>>Db2 >> Version 9.1
Ibm>>Db2 >> Version 9.1
Ibm>>Db2 >> Version 9.1
Ibm>>Db2 >> Version 9.1
Ibm>>Db2 >> Version 9.1
Ibm>>Db2 >> Version 9.1
Ibm>>Db2 >> Version 9.5
Ibm>>Db2 >> Version 9.5
Ibm>>Db2 >> Version 9.5
Ibm>>Db2 >> Version 9.5
Ibm>>Db2 >> Version 9.5
Ibm>>Db2 >> Version 9.5
Ibm>>Db2 >> Version 9.5
Ibm>>Db2 >> Version 9.5
Ibm>>Db2 >> Version 9.5
Ibm>>Db2 >> Version 9.5
Ibm>>Db2 >> Version 9.7
Ibm>>Db2 >> Version 9.7