CWE

Common Weakness Enumeration

A Community-Developed List of Software & Hardware Weakness Types

2021 CWE Most Important Hardware Weaknesses
CWE Top 25 Most Dangerous Weaknesses
Home>CWE List> CWE- Individual Dictionary Definition (4.10)
ID

CWE CATEGORY: OWASP Top Ten 2010 Category A3 - Broken Authentication and Session Management

Category ID: 812
+Summary
Weaknesses in this category are related to the A3 category in the OWASP Top Ten 2010.
+Membership
Nature Type ID Name
MemberOf ViewView - a subset of CWE entries that provides a way of examining CWE content. The two main view structures are Slices (flat lists) and Graphs (containing relationships between entries). 809 Weaknesses in OWASP Top Ten (2010)
HasMember ClassClass - a weakness that is described in a very abstract fashion, typically independent of any specific language or technology. More specific than a Pillar Weakness, but more general than a Base Weakness. Class level weaknesses typically describe issues in terms of 1 or 2 of the following dimensions: behavior, property, and resource. 287 Improper Authentication
HasMember BaseBase - a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource. 306 Missing Authentication for Critical Function
HasMember BaseBase - a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource. 307 Improper Restriction of Excessive Authentication Attempts
HasMember BaseBase - a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource. 798 Use of Hard-coded Credentials
+References
[REF-763] OWASP. "Top 10 2010-A3-Broken Authentication and Session Management". <http://www.owasp.org/index.php/Top_10_2010-A3-Broken_Authentication_and_Session_Management>.
+Content History
+Submissions
Submission Date Submitter Organization
2010-06-17 CWE Content Team MITRE
+Modifications
Modification Date Modifier Organization
2011-09-13 CWE Content Team MITRE
updated Relationships
More information is available — Please select a different filter.
Page Last Updated:January 31, 2023