The web application uses a weak authentication mechanism to verify that a request is coming from an authenticated and authorized resource.
References
Configurations
No configuration.
History
22 Nov 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-22 23:15
Updated : 2024-11-22 23:15
NVD link : CVE-2024-45369
Mitre link : CVE-2024-45369
CVE.ORG link : CVE-2024-45369
JSON object : View
Products Affected
No product.
CWE
CWE-287
Improper Authentication