Weakness Name | Source | |
---|---|---|
Category : Cryptographic Issues Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed. |
Metrics | Score | Severity | CVSS Vector | Source |
---|---|---|---|---|
V2 | 6.2 | AV:L/AC:L/Au:S/C:C/I:C/A:N | [email protected] |
Cisco>>Unified_communications_manager >> Version To (including) 10.0\(1\)
Cisco>>Unified_communications_manager >> Version 3.3\(5\)
Cisco>>Unified_communications_manager >> Version 3.3\(5\)sr1
Cisco>>Unified_communications_manager >> Version 3.3\(5\)sr2a
Cisco>>Unified_communications_manager >> Version 4.1\(3\)
Cisco>>Unified_communications_manager >> Version 4.1\(3\)sr1
Cisco>>Unified_communications_manager >> Version 4.1\(3\)sr2
Cisco>>Unified_communications_manager >> Version 4.1\(3\)sr3
Cisco>>Unified_communications_manager >> Version 4.1\(3\)sr4
Cisco>>Unified_communications_manager >> Version 4.2
Cisco>>Unified_communications_manager >> Version 4.2.1
Cisco>>Unified_communications_manager >> Version 4.2.2
Cisco>>Unified_communications_manager >> Version 4.2.3
Cisco>>Unified_communications_manager >> Version 4.2.3sr1
Cisco>>Unified_communications_manager >> Version 4.2.3sr2
Cisco>>Unified_communications_manager >> Version 4.2.3sr2b
Cisco>>Unified_communications_manager >> Version 4.3
Cisco>>Unified_communications_manager >> Version 10.0