CWE-290: Authentication Bypass by Spoofing

BaseIncomplete

This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.

View on MITRE
Back to CWE Lookup

Technical Details

Structure
Simple

Applicable To

Languages
Platforms

Learn More

CWE-290: Authentication Bypass by Spoofing | CWE Lookup | Inventive HQ