284
Source: cwe.mitre.org
Published:
<p>When any mechanism is not applied or otherwise fails, attackers can compromise the security of the product by gaining privileges, reading sensitive information, executing commands, evading detection, etc.</p> <p>There are two distinct behaviors that can introduce access control weaknesses:</p> <p