CWE-SANS-Top-25/Porous-defenses/CWE-285

From aldeid
Jump to navigation Jump to search

CWE-285: Improper Access Control (Authorization)

Description

Incomplete.png
INCOMPLETE SECTION OR ARTICLE
This section/article is being written and is therefore not complete.
Thank you for your comprehension.

Risk measurement

Weakness Prevalence High
Remediation Cost Low to Medium
Attack Frequency Often
Consequences Security bypass
Ease of Detection Moderate
Attacker Awareness High

Comments

Talk:CWE-SANS-Top-25/Porous-defenses/CWE-285