of OWASP Top 10 web vulnerabilities, including the columns 'position','name','description' Provide a list of OWASP Top 10 web vulnerabilities Context && Constraints
For Language Models 2. Effective Prompt Extraction from Language Models 3. HackTheBox Academy Prompt Injection Attacks 4. OWASP Top 10 for LLM Applications 2025 5. Prompts Should not be Seen as Secrets: Systematically Measuring Prompt Extraction Attack Success