Leveraging Active Adversary in the Middle Attacks to Bypass Same Origin Policy |
CWE-300
|
Channel Accessible by Non-Endpoint
|
|
Utilizing REST's Trust in the System Resource to Obtain Sensitive Data |
CWE-287
|
Improper Authentication
|
CWE-300
|
Channel Accessible by Non-Endpoint
|
CWE-693
|
Protection Mechanism Failure
|
|
DNS Blocking |
CWE-300
|
Channel Accessible by Non-Endpoint
|
|
IP Address Blocking |
CWE-300
|
Channel Accessible by Non-Endpoint
|
|
WiFi MAC Address Tracking |
CWE-201
|
Insertion of Sensitive Information Into Sent Data
|
CWE-300
|
Channel Accessible by Non-Endpoint
|
|
WiFi SSID Tracking |
CWE-201
|
Insertion of Sensitive Information Into Sent Data
|
CWE-300
|
Channel Accessible by Non-Endpoint
|
|
Evil Twin Wi-Fi Attack |
CWE-300
|
Channel Accessible by Non-Endpoint
|
|
Adversary in the Browser (AiTB) |
CWE-300
|
Channel Accessible by Non-Endpoint
|
CWE-494
|
Download of Code Without Integrity Check
|
|
Adversary in the Middle (AiTM) |
CWE-287
|
Improper Authentication
|
CWE-290
|
Authentication Bypass by Spoofing
|
CWE-294
|
Authentication Bypass by Capture-replay
|
CWE-300
|
Channel Accessible by Non-Endpoint
|
CWE-593
|
Authentication Bypass: OpenSSL CTX Object Modified after SSL Objects are Created
|
|