logo

Database

Home

Vulnerabilities

Weaknesses

Access Subversion

Data Manipulation

Deceptive Interactions

Functionality Abuse

Information Collection

Probabilistic Techniques

Protocol Manipulation

System Manipulation

Unexpected Injection

Fixes

Requirements

Standards

Rules


Documentation

Help

Log in to the platform

Website

Data sources

Home

Vulnerabilities

Weaknesses

Access Subversion

Data Manipulation

Deceptive Interactions

Functionality Abuse

Information Collection

Probabilistic Techniques

Protocol Manipulation

System Manipulation

Unexpected Injection

Fixes

Requirements

Standards

Rules


Documentation

Help

Log in to the platform

Website

Data sources

  1. /

  2. Home
  3. /

  4. Weaknesses
  5. /

  6. Data Manipulation

Data Manipulation

098. External control of file name or path103. Insufficient data authenticity validation - APK signing111. Out-of-bounds read123. Local file inclusion204. Insufficient data authenticity validation327. Insufficient data authenticity validation - Images355. Insufficient data authenticity validation - Checksum verification377. Insufficient data authenticity validation - Device Binding383. Insecurely generated token - OTP389. Insufficient data authenticity validation - JAR signing453. Data and model poisoning