Weakness Name | Source | |
---|---|---|
Category : DEPRECATED: Code This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree. |
||
Category : Cryptographic Issues Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed. |
Metrics | Score | Severity | CVSS Vector | Source |
---|---|---|---|---|
V2 | 4.3 | AV:N/AC:M/Au:N/C:P/I:N/A:N | [email protected] |
F5>>Big-iq_adc >> Version 4.5.0
F5>>Big-iq_cloud >> Version 4.4.0
F5>>Big-iq_cloud >> Version 4.5.0
F5>>Big-iq_device >> Version 4.4.0
F5>>Big-iq_device >> Version 4.5.0
F5>>Big-iq_security >> Version 4.4.0
F5>>Big-iq_security >> Version 4.5.0