SECURITY
API Security Encyclopedia
Explore vulnerabilities, framework-specific risks, LLM security, attack techniques, and protocol coverage.
Vulnerabilities
Api Key Exposure in APIs Api Rate Abuse in APIs Arp Spoofing in APIs Auth Bypass in APIs Beast Attack in APIs Bleichenbacher Attack in APIs Bola Idor in APIs Broken Access Control in APIs Broken Authentication in APIs Brute Force Attack in APIs Buffer Overflow in APIs Cache Poisoning in APIs Clickjacking in APIs Command Injection in APIs Container Escape in APIs Cors Wildcard in APIs Credential Stuffing in APIs Crlf Injection in APIs Cross Site Request Forgery in APIs Cryptographic Failures in APIs Dangling Dns in APIs Data Exposure in APIs Denial Of Service in APIs Dictionary Attack in APIs Distributed Denial Of Service in APIs Dns Cache Poisoning in APIs Dns Rebinding in APIs Double Free in APIs Email Injection in APIs Excessive Data Exposure in APIs Format String in APIs Formula Injection in APIs Graphql Introspection in APIs Hallucination Attacks in APIs Header Injection in APIs Heartbleed in APIs Identification Failures in APIs Information Disclosure in APIs Injection Flaws in APIs Insecure Deserialization in APIs Insecure Design in APIs Insecure Direct Object Reference in APIs Insufficient Logging in APIs Integer Overflow in APIs Integrity Failures in APIs Jwt Misconfiguration in APIs Ldap Injection in APIs Llm Data Leakage in APIs Log Injection in APIs Logging Monitoring Failures in APIs Man In The Middle in APIs Mass Assignment in APIs Memory Leak in APIs Missing Authentication in APIs Missing Tls in APIs Nosql Injection in APIs Null Pointer Dereference in APIs Open Redirect in APIs Out Of Bounds Read in APIs Out Of Bounds Write in APIs Padding Oracle in APIs Password Spraying in APIs Path Traversal in APIs Phishing Api Keys in APIs Pii Leakage in APIs Poodle Attack in APIs Privilege Escalation in APIs Prompt Injection in APIs Prototype Pollution in APIs Race Condition in APIs Rainbow Table Attack in APIs Rate Limiting Bypass in APIs Regex Dos in APIs Replay Attack in APIs Request Smuggling in APIs Resource Exhaustion in APIs Sandbox Escape in APIs Security Misconfiguration in APIs Server Side Template Injection in APIs Session Fixation in APIs Shellshock in APIs Side Channel Attack in APIs Spring4shell in APIs Sql Injection in APIs Ssrf Server Side in APIs Ssrf in APIs Stack Overflow in APIs Symlink Attack in APIs Time Of Check Time Of Use in APIs Timing Attack in APIs Token Leakage in APIs Type Confusion in APIs Unicode Normalization in APIs Uninitialized Memory in APIs Use After Free in APIs Webhook Abuse in APIs Xml External Entities in APIs Xpath Injection in APIs Xss Cross Site Scripting in APIs Zip Slip in APIs Zone Transfer in APIs
Frameworks
Actix API Security Adonisjs API Security Aspnet API Security Axum API Security Buffalo API Security Chi API Security Django API Security Echo Go API Security Express API Security Fastapi API Security Feathersjs API Security Fiber API Security Flask API Security Gin API Security Gorilla Mux API Security Grape API Security Hanami API Security Hapi API Security Koa API Security Laravel API Security Loopback API Security Nestjs API Security Phoenix API Security Rails API Security Restify API Security Rocket API Security Sails API Security Spring Boot API Security Strapi API Security
LLM Security
Anthropic API Security Anyscale API Security Aws Bedrock API Security Azure Openai API Security Cohere API Security Deepseek API Security Google Gemini API Security Groq API Security Huggingface API Security Meta Llama API Security Mistral API Security Openai API Security Perplexity API Security Replicate API Security Together Ai API Security
Attack Techniques
Adversarial Input Attack Api Abuse Attack Api Key Enumeration Attack Api Scraping Attack Api Version Exploitation Attack Brute Force Attack Cache Poisoning Attack Credential Stuffing Attack Deserialization Attack Attack Dns Rebinding Attack Graphql Batching Attack Graphql Introspection Abuse Attack Idor Enumeration Attack Jwt Cracking Attack Jwt None Algorithm Attack Llm Jailbreaking Attack Mass Assignment Exploit Attack Model Inversion Attack Nosql Injection Attack Open Redirect Chain Attack Parameter Tampering Attack Password Spraying Attack Privilege Escalation Attack Prompt Injection Direct Attack Prompt Injection Indirect Attack Race Condition Exploit Attack Rate Limit Bypass Attack Request Smuggling Attack Session Hijacking Attack Sql Injection Blind Attack Sql Injection Union Attack Ssrf Blind Attack Ssrf Cloud Metadata Attack Token Replay Attack Training Data Extraction Attack Webhook Spoofing Attack Xml Bomb Attack Xxe Oob Attack