CAPEC Related Weakness
Signature Spoof
CWE-20Improper Input Validation
CWE-290Authentication Bypass by Spoofing
CWE-327Use of a Broken or Risky Cryptographic Algorithm
Rooting SIM Cards
CWE-327Use of a Broken or Risky Cryptographic Algorithm
Cryptanalysis
CWE-327Use of a Broken or Risky Cryptographic Algorithm
Creating a Rogue Certification Authority Certificate
CWE-290Authentication Bypass by Spoofing
CWE-295Improper Certificate Validation
CWE-327Use of a Broken or Risky Cryptographic Algorithm
Signature Spoofing by Improper Validation
CWE-327Use of a Broken or Risky Cryptographic Algorithm
Encryption Brute Forcing
CWE-326Inadequate Encryption Strength
CWE-327Use of a Broken or Risky Cryptographic Algorithm
CWE-693Protection Mechanism Failure
CWE-719OWASP Top Ten 2007 Category A8 - Insecure Cryptographic Storage
Cryptanalysis of Cellular Encryption
CWE-327Use of a Broken or Risky Cryptographic Algorithm
Back to Top