Statements (13)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:Common_Weakness_Enumeration
|
gptkbp:bfsLayer |
6
|
gptkbp:bfsParent |
gptkb:CWE-23
|
gptkbp:category |
Access Control Issues
|
gptkbp:difficulty |
gptkb:High
|
gptkbp:example |
A user can access another user's account without proper authentication.
|
https://www.w3.org/2000/01/rdf-schema#label |
CWE-285
|
gptkbp:impact |
Unauthorized access to sensitive data or functionality.
|
gptkbp:is_described_as |
The software does not properly restrict access to a resource or action.
|
gptkbp:is_protected_by |
Implement proper access controls.
|
gptkbp:is_referenced_in |
https://cwe.mitre.org/data/definitions/285.html
|
gptkbp:name |
Improper Authorization
|
gptkbp:related_to |
gptkb:CWE-284
|