CAPEC Related Weakness
Accessing/Intercepting/Modifying HTTP Cookies
CWE-20Improper Input Validation
CWE-113Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')
CWE-302Authentication Bypass by Assumed-Immutable Data
CWE-311Missing Encryption of Sensitive Data
CWE-315Cleartext Storage of Sensitive Information in a Cookie
CWE-384Session Fixation
CWE-472External Control of Assumed-Immutable Web Parameter
CWE-539Use of Persistent Cookies Containing Sensitive Information
CWE-565Reliance on Cookies without Validation and Integrity Checking
CWE-602Client-Side Enforcement of Server-Side Security
CWE-642External Control of Critical State Data
CWE-724OWASP Top Ten 2004 Category A3 - Broken Authentication and Session Management
Utilizing REST's Trust in the System Resource to Obtain Sensitive Data
CWE-287Improper Authentication
CWE-300Channel Accessible by Non-Endpoint
CWE-693Protection Mechanism Failure
CWE-724OWASP Top Ten 2004 Category A3 - Broken Authentication and Session Management
Man in the Middle Attack
CWE-287Improper Authentication
CWE-290Authentication Bypass by Spoofing
CWE-294Authentication Bypass by Capture-replay
CWE-300Channel Accessible by Non-Endpoint
CWE-593Authentication Bypass: OpenSSL CTX Object Modified after SSL Objects are Created
CWE-724OWASP Top Ten 2004 Category A3 - Broken Authentication and Session Management
Back to Top