Loading...
A quick overview of our current lab activity, available vulnerabilities, and challenges.
| Vulnerability | Change | Count |
|---|---|---|
| RCE | - | 14 |
| Privilege Escalation | - | 10 |
| JWT | - | 9 |
| SQL Injection | - | 4 |
| File Upload | - | 4 |
| Path Traversal | - | 4 |
| Account Takeover | - | 3 |
| Authentication Bypass | - | 2 |
| Graphql | - | 2 |
| Deserialization | - | 2 |
| NoSQL Injection | - | 2 |
| Mass Assignment | - | 2 |
| IDOR | - | 2 |
| SSTI | - | 1 |
| HTTP Request Smuggling | - | 1 |
| XSS | - | 1 |
| Business Logic | - | 1 |
| SSRF | - | 1 |
| Information Disclosure | - | 1 |
| Open Redirect | - | 1 |