"The product implements an authentication technique, but it skips a step that weakens the technique." - Entry from the Common Weakness Enumeration
For more info visit <a href="https://cwe.mitre.org/data/definitions/304.html" target="_blank" rel="noopener noreferrer">CWE-304</a>