Injection
Index¶
- Command Injection
- CRLF Injection
- Deserialization Attack
- Directory traversal
- File inclusion
- Improper Input Validation Injection
- Stored Improper Input Validation Injection
- JWT algorithm confusion
- JWT no algorithm
- JWT Signature check
- Vulnerable LLM
- LLM Endpoint Detection
- LLM Excessive Agency
- LLM Insecure Output Handling
- LLM Insecure Plugin Design
- LLM JailBreak
- LLM Model Denial of Service
- LLM Model Theft
- LLM Overreliance
- LLM Prompt Injection
- LLM Sensitive Information Disclosure
- LLM Supply Chain Vulnerabilities
- LLM Training Data Poisoning
- Log4Shell
- Mass Assignment
- NoSQL Injection
- NoSQL Injection Stored
- SQL Injection
- SSTI (Server-Side Template Injection)
- XXE Injection