angler-fishThe Vulnerability History Project

CWE-290: Authentication Bypass by Spoofing

"This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks." - Entry from the Common Weakness Enumeration

For more info visit CWE-290

Examples


    There are no articles here... yet

expand_less