angler-fishThe Vulnerability History Project

CWE-305: Authentication Bypass by Primary Weakness

"The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error." - Entry from the Common Weakness Enumeration For more info visit <a href="https://cwe.mitre.org/data/definitions/305.html" target="_blank" rel="noopener noreferrer">CWE-305</a>

Examples


    There are no articles here... yet

expand_less