Weakness Name | Source | |
---|---|---|
Exposure of Sensitive Information to an Unauthorized Actor The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
||
Category : Cryptographic Issues Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed. |
Metrics | Score | Severity | CVSS Vector | Source |
---|---|---|---|---|
V2 | 4.3 | AV:N/AC:M/Au:N/C:P/I:N/A:N | [email protected] |
Cisco>>Content_security_management_virtual_appliance >> Version 8.4.0.0150
Cisco>>Content_security_management_virtual_appliance >> Version 9.0.0.087
Cisco>>Email_security_virtual_appliance >> Version 8.0.0
Cisco>>Email_security_virtual_appliance >> Version 8.5.6
Cisco>>Email_security_virtual_appliance >> Version 8.5.7
Cisco>>Email_security_virtual_appliance >> Version 9.0.0
Cisco>>Web_security_virtual_appliance >> Version 7.7.5
Cisco>>Web_security_virtual_appliance >> Version 8.0.5
Cisco>>Web_security_virtual_appliance >> Version 8.5.0
Cisco>>Web_security_virtual_appliance >> Version 8.5.1
Cisco>>Web_security_virtual_appliance >> Version 8.6.0
Cisco>>Web_security_virtual_appliance >> Version 8.7.0