📄️ Command Injection
Description
📄️ CRLF Injection
Description
📄️ Deserialization Attack
Description
📄️ Directory traversal
Description
📄️ File inclusion
Description
📄️ Improper Input Validation Injection
Description
📄️ Stored Improper Input Validation Injection
Description
📄️ JWT algorithm confusion
Description
📄️ JWT no algorithm
Description
📄️ JWT Signature check
Description
📄️ Vulnerable LLM
Description
📄️ LLM Endpoint Detection
Description
📄️ LLM Excessive Agency
Description
📄️ LLM Insecure Output Handling
Description
📄️ LLM Insecure Plugin Design
Description
📄️ LLM JailBreak
Description
📄️ LLM Model Denial of Service
Description
📄️ LLM Model Theft
Description
📄️ LLM Overreliance
Description
📄️ LLM Prompt Injection
Description
📄️ LLM Sensitive Information Disclosure
Description
📄️ LLM Supply Chain Vulnerabilities
Description
📄️ LLM Training Data Poisoning
Description
📄️ Log4Shell
Description
📄️ Mass Assignment
Description
📄️ NoSQL Injection
Description
📄️ NoSQL Injection Stored
Description
📄️ SQL Injection
Description
📄️ SSTI (Server-Side Template Injection)
Description
📄️ XXE Injection
Description