CWE-SANS-Top-25/Porous-defenses/CWE-285
Jump to navigation
Jump to search
CWE-285: Improper Access Control (Authorization)
Description
INCOMPLETE SECTION OR ARTICLE
This section/article is being written and is therefore not complete.
Thank you for your comprehension.
Thank you for your comprehension.
Risk measurement
Weakness Prevalence | High |
---|---|
Remediation Cost | Low to Medium |
Attack Frequency | Often |
Consequences | Security bypass |
Ease of Detection | Moderate |
Attacker Awareness | High |