This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.
This weakness can allow an attacker to access resources which are not otherwise accessible without proper authentication.
Explore 493 software weaknesses
Search 294,000+ vulnerabilities
Learn from real-world examples
Cybersecurity research & tools
Get in touch for collaboration
Explore more security resources