theory 9 Authentication vulnerabilities Jul 23, 2025 Broken Access Control Jul 9, 2025 Web LLM attacks Jul 7, 2025 SQLi Jul 4, 2025 OS command injection Jul 4, 2025 File upload vulnerabilities Jun 29, 2025 XSS - Exploiting cross-site scripting Jun 27, 2025 Directory Path Traversal Jun 27, 2025 Cross-site request forgery Apr 28, 2025