CAPEC Related Weakness
Authentication Abuse
CWE-287Improper Authentication
Exploiting Trust in Client (aka Make the Client Invisible)
CWE-20Improper Input Validation
CWE-200Information Exposure
CWE-287Improper Authentication
CWE-290Authentication Bypass by Spoofing
CWE-693Protection Mechanism Failure
Utilizing REST's Trust in the System Resource to Register Man in the Middle
CWE-287Improper Authentication
CWE-300Channel Accessible by Non-Endpoint ('Man-in-the-Middle')
CWE-693Protection Mechanism Failure
CWE-724
Man in the Middle Attack
CWE-287Improper Authentication
CWE-290Authentication Bypass by Spoofing
CWE-294Authentication Bypass by Capture-replay
CWE-300Channel Accessible by Non-Endpoint ('Man-in-the-Middle')
CWE-593Authentication Bypass: OpenSSL CTX Object Modified after SSL Objects are Created
CWE-724
Back to Top