logo

Database

Home

Vulnerabilities

Weaknesses

Access Subversion

Data Manipulation

Deceptive Interactions

Functionality Abuse

Information Collection

Probabilistic Techniques

Protocol Manipulation

System Manipulation

Unexpected Injection

Fixes

Requirements

Standards

Rules


Documentation

Help

Log in to the platform

Website

Data sources

Home

Vulnerabilities

Weaknesses

Access Subversion

Data Manipulation

Deceptive Interactions

Functionality Abuse

Information Collection

Probabilistic Techniques

Protocol Manipulation

System Manipulation

Unexpected Injection

Fixes

Requirements

Standards

Rules


Documentation

Help

Log in to the platform

Website

Data sources

  1. /

  2. Home
  3. /

  4. Weaknesses
  5. /

  6. Deceptive Interactions

Deceptive Interactions

023. Uncontrolled external site redirect - Host Header Injection032. Spoofing078. Insecurely generated token084. MDNS spoofing086. Missing subresource integrity check097. Reverse tabnabbing100. Server-side request forgery (SSRF)114. Phishing156. Uncontrolled external site redirect182. Email spoofing309. Insecurely generated token - JWT318. Insecurely generated token - Validation322. Insecurely generated token - Lifespan360. Clickjacking408. Traceability Loss - API Gateway456. AI misinformation