CAPEC Related Weakness
Man in the Middle Attack
CWE-287Improper Authentication
CWE-290Authentication Bypass by Spoofing
CWE-294Authentication Bypass by Capture-replay
CWE-300Channel Accessible by Non-Endpoint
CWE-593Authentication Bypass: OpenSSL CTX Object Modified after SSL Objects are Created
CWE-724OWASP Top Ten 2004 Category A3 - Broken Authentication and Session Management
Utilizing REST's Trust in the System Resource to Obtain Sensitive Data
CWE-287Improper Authentication
CWE-300Channel Accessible by Non-Endpoint
CWE-693Protection Mechanism Failure
CWE-724OWASP Top Ten 2004 Category A3 - Broken Authentication and Session Management
Session Hijacking
CWE-287Improper Authentication
Fake the Source of Data
CWE-287Improper Authentication
Authentication Abuse
CWE-287Improper Authentication
Identity Spoofing
CWE-287Improper Authentication
Token Impersonation
CWE-287Improper Authentication
Authentication Bypass
CWE-287Improper Authentication
Exploiting Trust in Client
CWE-20Improper Input Validation
CWE-200Exposure of Sensitive Information to an Unauthorized Actor
CWE-287Improper Authentication
CWE-290Authentication Bypass by Spoofing
CWE-693Protection Mechanism Failure
Upload a Web Shell to a Web Server
CWE-287Improper Authentication
CWE-553Command Shell in Externally Accessible Directory
Back to Top