Exploitation of Authentication |
| Category ID: 225 | Status: Draft |
| CWE-ID | Weakness Name | Weakness Relationship Type |
|---|---|---|
| 306 | Missing Authentication for Critical Function | Targeted |
| Nature | Type | ID | Name | Description | View(s) this relationship pertains to![]() |
|---|---|---|---|---|---|
| ParentOf | Attack Pattern | 21 | Exploitation of Session Variables, Resource IDs and other Trusted Credentials | Mechanism of Attack (primary)1000 | |
| ParentOf | Attack Pattern | 114 | Authentication Abuse | Mechanism of Attack (primary)1000 | |
| ParentOf | Attack Pattern | 115 | Authentication Bypass | Mechanism of Attack (primary)1000 | |
| MemberOf | 1000 | Mechanism of Attack | Mechanism of Attack1000 |
Security-Database help your corporation foresee and avoid any security risks that may impact your IT infrastructure and business applications.