Attack Type

Prompt Injection

Prompt injection is the most prevalent attack technique against LLM-based applications. The attacker embeds instructions inside untrusted input — a user message, a retrieved document, or a tool output — that the model then follows instead of (or in addition to) its system prompt. Variants include direct prompt injection (the attacker controls the user turn) and indirect prompt injection (instructions planted in content the LLM will later read, such as a web page or a PDF the application summarises). The OWASP LLM Top 10 ranks prompt injection as LLM01 — the highest-impact risk for production LLM applications. Real-world example: CVE-2024-11041 affected vLLM 0.5.5, where crafted prompts could trigger remote code execution via the OpenAI-compatible chat completion endpoint. Defenses include input classification, strict output parsing, separating trusted and untrusted context, and least-privilege tool design in agent frameworks.

103
Total CVEs
6
Pages
Page 1 of 6
Current
Severity CVE CVSS
CRITICAL CVE-2026-27966 9.8
HIGH CVE-2026-25750 8.1
UNKNOWN CVE-2026-25083 -
CRITICAL CVE-2026-28451 9.3
CRITICAL CVE-2026-30741 9.8
MEDIUM CVE-2026-27578 5.4
CRITICAL CVE-2023-29374 9.8
CRITICAL CVE-2023-36095 9.8
CRITICAL CVE-2023-38860 9.8
CRITICAL CVE-2023-38896 9.8
CRITICAL CVE-2023-39659 9.8
HIGH CVE-2023-32786 7.5
HIGH CVE-2024-38459 7.8
HIGH CVE-2024-21513 8.5
CRITICAL CVE-2024-7042 9.8
CRITICAL CVE-2024-8309 9.8
CRITICAL CVE-2025-46059 9.8
HIGH CVE-2025-65106 -
HIGH CVE-2024-58340 7.5
HIGH CVE-2025-5018 7.1

Page 1 of 6