Cache Poisoning |
CWE-345
|
Insufficient Verification of Data Authenticity
|
CWE-346
|
Origin Validation Error
|
CWE-348
|
Use of Less Trusted Source
|
CWE-349
|
Acceptance of Extraneous Untrusted Data With Trusted Data
|
CWE-441
|
Unintended Proxy or Intermediary ('Confused Deputy')
|
|
XML Routing Detour Attacks |
CWE-441
|
Unintended Proxy or Intermediary ('Confused Deputy')
|
CWE-610
|
Externally Controlled Reference to a Resource in Another Sphere
|
|
Transparent Proxy Abuse |
CWE-441
|
Unintended Proxy or Intermediary ('Confused Deputy')
|
|
DNS Cache Poisoning |
CWE-345
|
Insufficient Verification of Data Authenticity
|
CWE-346
|
Origin Validation Error
|
CWE-348
|
Use of Less Trusted Source
|
CWE-349
|
Acceptance of Extraneous Untrusted Data With Trusted Data
|
CWE-350
|
Reliance on Reverse DNS Resolution for a Security-Critical Action
|
CWE-441
|
Unintended Proxy or Intermediary ('Confused Deputy')
|
|