| Weakness Name | Source | |
|---|---|---|
| Category : Configuration Weaknesses in this category are typically introduced during the configuration of the software. |
||
| Category : Permissions, Privileges, and Access Controls Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control. |
| Metrics | Score | Severity | CVSS Vector | Source |
|---|---|---|---|---|
| V2 | 2.1 | AV:N/AC:H/Au:S/C:N/I:P/A:N | nvd@nist.gov |
Mit>>Kerberos_5 >> Version 1.7