Knowledge Base - Issues
Our knowledge-base provides a comprehensive collection of information on vulnerabilities related to cyber security.Application signed with an expired certificate is an authentication vulnerability that occurs when an application, such as an app on Android, iOS, or a Mobile App, is signed with an expired certificate, allowing users to execute a malicious application. This vulnerability has been identified in the Common Weakness Enumeration (CWE)...
Authentication Bypass by Capture-replay is a class of vulnerability found in web and API applications that allows an attacker to bypass authentication mechanisms by replaying credentials or authentication tokens that were previously captured (CWE-287). The attack is usually executed by intercepting the authentication traffic via man-in-the-middle or by sniffing the...
Authentication Bypass by Spoofing is a type of vulnerability which occurs when an attacker is able to bypass the authentication process by providing false or incorrect credentials. This vulnerability is categorized under Authentication in the [Common Weakness Enumeration (CWE)](https://cwe.mitre.org/data/definitions/287.html) directory and is applicable to Web and API applications. It is...
Authentication Bypass Using an Alternate Path or Channel (CWE-287) is a vulnerability that can occur when authentication is not properly enforced, or when an alternate path or channel is used to bypass authentication. In web and API applications, this can occur when an attacker can gain access to an application...
Backdoors are authentication vulnerabilities that allow attackers to bypass authentication mechanisms and gain access to systems, applications, or other resources. This type of vulnerability is defined in the Common Weakness Enumeration (CWE) directory as CWE-798: Use of Hard-coded Credentials. It affects web and API applications as well as infrastructure components...
Browser Cache Weaknesses is a type of authentication vulnerability, commonly found in Web and API applications, as classified by the Common Weakness Enumeration (CWE) directory. This vulnerability occurs when a browser stores credentials and other sensitive information in the browser cache, and this information can be accessed by an attacker,...
Description
Cleartext submission of password is a vulnerability classified under CWE-259: Use of Hard-coded Password. It occurs when a password is transmitted in a non-encrypted form during authentication processes over an open network like the internet. This is a high risk vulnerability as unencrypted data can be easily intercepted by malicious...
Cookie Variable Exposed is a type of vulnerability commonly found in web and API applications. It occurs when data stored in a cookie is made available to an unauthorized user, allowing them to gain access to the application or system. This vulnerability is classified as an Authentication vulnerability in the...
Credit card numbers disclosed is an authentication vulnerability (CWE-522) where credit card numbers, expiration dates, and CVV numbers are exposed during authentication. This vulnerability is commonly found in web applications and APIs (OWASP Testing Guide, V3.0). This type of vulnerability can be exploited with malicious intent, such as stealing credit...
Cross-domain script include is a type of authentication vulnerability that occurs when a web application allows malicious scripts to be included from a different domain. This type of vulnerability can allow attackers to bypass access controls, such as the same-origin policy, allowing them to access sensitive data from the victim’s...
Description
Deauthentication DoS Attack is a type of attack in which an attacker sends deauthentication frames to the wireless access point or wireless client, thereby disabling the wireless connection and preventing the client from reconnecting to the access point. This attack is also known as “Deauth Attack”, “Deauthentication Flood”, or “Deauth...
Expired Certificate is an authentication vulnerability classified as CWE-284 and listed as A6 in the OWASP Testing Guide. It is a type of vulnerability that affects infrastructure, specifically SSL/TLS encryption. When an SSL certificate expires, it can no longer be used to authenticate the connection between two parties, resulting in...
Guessable CAPTCHA, also known as CWE-801, is a vulnerability that arises when a CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is used in an authentication system. CAPTCHAs are designed to be difficult for machines to solve, but easy for humans to solve. However, Guessable CAPTCHAs...
Improper Access Control is an IT vulnerability that enables an individual to gain access to unauthorized information or resources. This vulnerability is categorized under Authentication and can be found in Web and API applications. According to the Common Weakness Enumeration (CWE) directory, Improper Access Control is defined as "a weakness...
Improper Authentication is a vulnerability category in the CWE Top 25 (2022) and is defined as "failure to properly authenticate users, resulting in the ability to access unauthorized resources" (CWE, n.d.). This vulnerability typically occurs in web and API applications. According to the OWASP Testing Guide, there are two main...
Insecure Direct Object References (CWE-639) is a type of authentication vulnerability that occurs when a web application or API provides direct access to objects based on user-supplied input. According to the OWASP Testing Guide, an Insecure Direct Object Reference can occur when an application uses an “unvalidated parameter, such as...
Key Exchange without Entity Authentication is a type of authentication vulnerability (CWE-287) that occurs when an application does not authenticate the entities involved in a key exchange. This can allow an attacker to impersonate the legitimate entity, gain access to the system, and manipulate the key exchange. This vulnerability is...
Logout does not invalidate session token is a vulnerability in authentication security systems of Web and API applications. It occurs when a website does not properly invalidate the token issued to a user upon logging out. This vulnerability is classified as CWE-613 and is described in the OWASP Testing Guide....
MAC Spoofing of Device with known PSK is a type of authentication vulnerability (CWE-287) that occurs in infrastructure. It is a type of attack in which the attacker changes the MAC address of the device with a known pre-shared key (PSK) in order to gain access to the network. This...
Missing Authentication for Critical Function (CWE-306) is a vulnerability that happens when there is no authentication for critical functions. This vulnerability can occur in web and API applications. According to the Common Weakness Enumeration (CWE), this vulnerability is listed in the CWE Top 25 (2022) and is a subclass of...
Missing Certificate Pinning is an authentication vulnerability (CWE-295) that occurs when an application fails to verify a given certificate against its trusted peers, allowing a malicious certificate to be used as authentication. This type of vulnerability is often found in infrastructure applications, such as web browsers and mobile applications, as...
Missing Critical Step in Authentication is a type of authentication vulnerability, which is categorized as CWE-287 (Authentication Issues) according to the CWE directory. This vulnerability occurs when authentication steps are either missing or incomplete, leaving the system vulnerable to attack. This vulnerability is common in web and API applications, where...
No lockout information is an authentication vulnerability, identified as CWE-307 in the Common Weakness Enumeration, that occurs when a system does not track failed login attempts as part of authentication. This vulnerability can result in an attacker being able to guess passwords without ever having their access be locked. According...
No Multi-factor authentication (CWE-287) is a vulnerability in authentication protocols that allows an attacker to gain access to systems or applications using only a single set of credentials. This vulnerability can be found in Infrastructure, Mobile App and Web and API. According to the OWASP Testing Guide, this vulnerability is...
Description
No usage limits is an authentication vulnerability that occurs when authentication mechanisms do not enforce a limit on the number of failed attempts before locking a user account (CWE-532). This vulnerability can be found in web and API applications and can result in unauthorized access. According to the OWASP Testing...
Old Password for krbtgt Account is a type of IT vulnerability that falls under the category of Authentication. It is also classified as CWE-732 (Improper Limitation of a Pathname to a Restricted Directory), according to the Common Weakness Enumeration (CWE) directory. This vulnerability occurs when the krbtgt account password is...
Password submitted using GET Method is a vulnerability in authentication systems, where passwords are being sent using the GET request. This vulnerability is also known as CWE-521 and was identified in the OWASP Testing Guide in section 4.2.2.1 (Sensitive Data Exposure). This vulnerability can occur when an application does not...
Password value set in cookie is an authentication vulnerability that occurs when a web application stores the user's password as a cookie on the user's device, which can be accessed by malicious actors. The Common Weakness Enumeration (CWE) directory classifies this vulnerability as CWE-315, which is defined as “Cleartext Storage...
Request URL override is an authentication vulnerability (CWE-287) in Web and API applications. It occurs when a server is not properly validating URLs, and allows an attacker to bypass authentication and gain access to restricted resources. This vulnerability is explained in the OWASP Testing Guide, in the chapter on authentication...
Silverlight cross-domain policy is an authentication vulnerability that exists in web and API applications utilizing Silverlight (Microsoft's Rich Internet Application platform) and is classified under CWE-287 (Improper Authentication). This vulnerability results from Silverlight not properly validating the origin of cross-domain requests, allowing malicious domain owners to bypass the intended security...
SMB Signing not required (CWE-308) is a type of authentication vulnerability that occurs in IT infrastructure. It occurs when an organization fails to require SMB Signing, which is a security feature that digitally signs SMB packets. This vulnerability can be exploited by attackers who can use malicious packets to gain...
Spoofable client IP address is an authentication vulnerability (CWE-287) that occurs in infrastructure. This vulnerability occurs when an attacker is able to spoof their IP address, in order to bypass authentication. This is often done by impersonating the IP address of a trusted source, to gain access to systems or...
Use of Client-Side Authentication is a vulnerability that occurs when authentication is solely based on client-side technologies. This type of authentication is vulnerable to malicious users who can manipulate the authentication process by modifying and tampering with the client-side code (CWE-311). This type of authentication can be found in web...
Use of Password Hash Instead of Password for Authentication (CWE-299) is a vulnerability involving authentication procedures for web applications and APIs. This vulnerability occurs when credentials are stored in the form of a hash instead of a password, allowing attackers to access systems without knowing the original password. This vulnerability...
Weak Password Change or Reset Functionalities is an authentication vulnerability (CWE-259) that affects web and API applications. It occurs when there are no restrictions on the strength of passwords that can be set or reset. As a result, users are allowed to set weak passwords, increasing the risk of unauthorized...
Weak Security Question Answer (CWE-521) is a type of authentication vulnerability in which a user is able to provide an incorrect answer to a security question and gain access to a system. This vulnerability is most commonly found in web and API applications, where security questions are used as a...
Weaker Authentication in Alternative Channel (CWE-287) is a vulnerability in authentication that occurs when an alternative authentication channel is used with a weaker authentication mechanism than what is used in the primary channel. This is commonly found in web and API applications when a secondary authentication mechanism (such as SMS...
Showing entries 1 to 37 of 37 entries.