Authentication bypass by spoofing

From OWASP
Jump to: navigation, search


This page was marked to be reviewed for deletion.



#REDIRECT :Category:Authentication Vulnerability


Last revision (mm/dd/yy): 05/26/2009


Description

Insufficient verification of user identity.


Risk Factors

TBD


Examples

TBD

Related Attacks


Related Vulnerabilities

Related Controls


Related Technical Impacts


References

TBD