logo

Database

Home

Vulnerabilities

Weaknesses

Access Subversion

Data Manipulation

Deceptive Interactions

Functionality Abuse

Information Collection

Probabilistic Techniques

Protocol Manipulation

System Manipulation

Unexpected Injection

Fixes

Requirements

Standards

Rules


Documentation

Help

Log in to the platform

Website

Data sources

Home

Vulnerabilities

Weaknesses

Access Subversion

Data Manipulation

Deceptive Interactions

Functionality Abuse

Information Collection

Probabilistic Techniques

Protocol Manipulation

System Manipulation

Unexpected Injection

Fixes

Requirements

Standards

Rules


Documentation

Help

Log in to the platform

Website

Data sources

  1. /

  2. Home
  3. /

  4. Weaknesses
  5. /

  6. Protocol Manipulation

Protocol Manipulation

015. Insecure authentication method - Basic043. Insecure or unset HTTP headers - Content-Security-Policy044. Insecure HTTP methods enabled071. Insecure or unset HTTP headers - Referrer-Policy131. Insecure or unset HTTP headers - Strict Transport Security132. Insecure or unset HTTP headers - X-Content-Type-Options134. Insecure or unset HTTP headers - CORS135. Insecure or unset HTTP headers - X-XSS Protection136. Insecure or unset HTTP headers - Cache Control137. Insecure or unset HTTP headers - X-Permitted-Cross-Domain-Policies152. Insecure or unset HTTP headers - X-Frame Options153. Insecure or unset HTTP headers - Accept329. Insecure or unset HTTP headers - Content-Type388. Insecure authentication method - NTLM397. Insecure authentication method - LDAP440. Insecure or unset HTTP headers - Permissions-Policy449. Insecure authentication method