Improper Authentication
Improper authentication occurs when an application improperly verifies the identity of a user.
A software incorrectly validates user's login information and as a result, an attacker can gain certain privileges within the application or disclose sensitive information that allows them to access sensitive data and provoke arbitrary code execution.
The weakness is introduced during Architecture and Design, Implementation stages.
A software incorrectly validates user's login information and as a result, an attacker can gain certain privileges within the application or disclose sensitive information that allows them to access sensitive data and provoke arbitrary code execution.
The weakness is introduced during Architecture and Design, Implementation stages.