| Authentication Abuse |
|
CWE-287
|
Improper Authentication
|
|
CWE-1244
|
Internal Asset Exposed to Unsafe Debug Access Level or State
|
|
| Authentication Bypass |
|
| Identity Spoofing |
|
| Fake the Source of Data |
|
| Exploiting Trust in Client |
|
CWE-20
|
Improper Input Validation
|
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
CWE-287
|
Improper Authentication
|
|
CWE-290
|
Authentication Bypass by Spoofing
|
|
CWE-693
|
Protection Mechanism Failure
|
|
| Utilizing REST's Trust in the System Resource to Obtain Sensitive Data |
|
CWE-287
|
Improper Authentication
|
|
CWE-300
|
Channel Accessible by Non-Endpoint
|
|
CWE-693
|
Protection Mechanism Failure
|
|
| Session Hijacking |
|
| Token Impersonation |
|
CWE-287
|
Improper Authentication
|
|
CWE-1270
|
Generation of Incorrect Security Tokens
|
|
| Upload a Web Shell to a Web Server |
|
CWE-287
|
Improper Authentication
|
|
CWE-553
|
Command Shell in Externally Accessible Directory
|
|
| Adversary in the Middle (AiTM) |
|
CWE-287
|
Improper Authentication
|
|
CWE-290
|
Authentication Bypass by Spoofing
|
|
CWE-294
|
Authentication Bypass by Capture-replay
|
|
CWE-300
|
Channel Accessible by Non-Endpoint
|
|
CWE-593
|
Authentication Bypass: OpenSSL CTX Object Modified after SSL Objects are Created
|
|