CWE-SANS-Top-25/Porous-defenses/CWE-285
Jump to navigation
Jump to search
CWE-285: Improper Access Control (Authorization)
Description

INCOMPLETE SECTION OR ARTICLE
This section/article is being written and is therefore not complete.
Thank you for your comprehension.
Thank you for your comprehension.
Risk measurement
| Weakness Prevalence | High |
|---|---|
| Remediation Cost | Low to Medium |
| Attack Frequency | Often |
| Consequences | Security bypass |
| Ease of Detection | Moderate |
| Attacker Awareness | High |