Advanced Features

Vulnerability Database

Track and analyze known LLM vulnerabilities with a comprehensive database that keeps you informed about emerging threats, attack vectors, and proven mitigations. Stay ahead of attackers by understanding the security landscape.

Track and analyze known LLM vulnerabilities with a comprehensive database that keeps you informed about emerging threats, attack vectors, and proven mitigations. Stay ahead of attackers by understanding the security landscape.

Last Updated on November 2, 2025

After testing your AI for jailbreak vulnerabilities, you need to understand the bigger picture, what threats exist in the wild, how they work, and how other teams are defending against them. That's where the Vulnerability Database comes in.

Accessing Your Vulnerability Dashboard

Find "Vulnerability Database" in your left sidebar under the "RED TEAMING & TESTING" section. Click it and you'll land on the main dashboard showing your current threat landscape at a glance.

Dashboard Overview

The top of the page displays four key metrics in large cards:

Total Vulnerabilities shows you how many documented threats exist in the database. The small green indicator (↗12%) tells you this number increased by 12% recently, meaning new vulnerabilities are being discovered and added. This is normal and expected as the field evolves.

Critical Severity counts vulnerabilities that could lead to severe consequences data breaches, harmful content generation, complete safety bypass. You'll see a warning triangle icon here. In our example, it shows 0 critical vulnerabilities, which is good news. When this number isn't zero, those should be your priority.

High Severity tracks serious but not critical vulnerabilities. These could still cause significant harm and should be addressed promptly. Our example shows 60 high-severity threats, which is typical for a comprehensive database covering all known attack vectors.

Recent (7 days) tells you what's new vulnerabilities added or updated in the past week. Updates happen regularly as new research emerges and existing vulnerabilities get refined.

Navigating the Vulnerability List

Below the dashboard cards, you'll see three tabs: "All Vulnerabilities (62)," "Recent (12)," and "Analytics."

The default view shows all vulnerabilities as cards arranged in a grid. Each card is a compact summary of one threat, designed to give you enough information to decide if it's relevant to your system.

There's also a search bar if you're looking for something specific. Search by keywords, vulnerability titles, or descriptions—maybe you want to find all "prompt injection" related threats or anything affecting "GPT-4."

Severity Levels Explained

Critical (90-100) represents existential threats. Complete safety bypass, data exposure, serious harm at scale. Drop everything and address immediately.

High (70-89) indicates serious vulnerabilities attackers can reliably exploit. Address within days. Most effective jailbreak techniques fall here.

Medium (40-69) represents vulnerabilities that work in specific circumstances. Address them, but they're not burning fires.

Low (below 40) tracks theoretical vulnerabilities requiring such specific conditions that real-world exploitation is unlikely.

The Vulnerability Database combined with your jailbreak testing creates comprehensive security you're testing your specific system while staying informed about threats you might not have considered.

© Disseqt AI Product Starter Guide

© Disseqt AI Product Starter Guide

© Disseqt AI Product Starter Guide