Pretraži prema CWE oznaci - CERT CVE

CWE lista

CWE ID Opis
CWE-290 This attack-focused weakness is caused by improperly implemented authentication schemes that are subject to spoofing attacks.
CWE-291 The software uses an IP address for authentication.
CWE-292 This entry has been deprecated because it was a duplicate of CWE-350. All content has been transferred to CWE-350.
CWE-293 The referer field in HTTP requests can be easily modified and, as such, is not a valid means of message integrity checking.
CWE-294 A capture-replay flaw exists when the design of the software makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).
CWE-295 The software does not validate, or incorrectly validates, a certificate.
CWE-296 The software does not follow, or incorrectly follows, the chain of trust for a certificate back to a trusted root certificate, resulting in incorrect trust of any resource that is associated with that certificate.
CWE-297 The software communicates with a host that provides a certificate, but the software does not properly ensure that the certificate is actually associated with that host.
CWE-298 A certificate expiration is not validated or is incorrectly validated, so trust may be assigned to certificates that have been abandoned due to age.
CWE-299 The software does not check or incorrectly checks the revocation status of a certificate, which may cause it to use a certificate that has been compromised.