General Information

Insufficient Logging Abuse

Variants:
Direct 

Also Known As:
Insufficient Logging

Vector Type:
Vulnerability

Relevance:
Generic

Layer:
Application-Level, Web-Infrastructure-Level

Platforms:
Any

Target Type:
Application

Affected Mechanisms:
Logging

Invented In:
01/01/1999

Added In:
21/12/2014


Vector Operation Method:
Attackers can abuse the lack of sufficient security event logging to attack applications without being held responsible, and avoid detection long enough to complete the attack process.


Direct Variant:

Insufficient Logging Abuse

Also Known As:
Insufficient Logging

Typical Severity:
Minor

Resources:

White Papers:

Learn More: