Inadequate Input Validation
Table of contents
- Data and Model Poisoning Vulnerability in LLM
- File Inclusion Vulnerability
- HTTP Response Splitting Vulnerability
- Insufficient Input Validation Vulnerability
- Log Injection Vulnerability
- Mass Assignment Vulnerability
- Misinformation Vulnerability in LLM
- Prototype Pollution Vulnerability
- Server-Side Template Injection Vulnerability
- Subresource Integrity Vulnerability
- Type Juggling Vulnerability