Injection vulnerabilities occur when untrusted data is sent to an interpreter as part of a command or query, allowing attackers to execute unintended commands or access unauthorized data.
Injection Vulnerabilities Overview
SQL Injection
NoSQL Injection
OS Command Injection
LDAP Injection
Template Injection
XML Injection
Code Injection
eval()
in various programming languages. This vulnerability can lead to complete system compromise.To prevent Code Injection:eval()
HTTP Header Injection
Path Traversal Injection
Email Header Injection
Format String Injection
Log Injection
Server-Side Includes (SSI) Injection
CRLF Injection
XPath Injection
JSON Injection
HTML Injection
CSS Injection
Shell Metacharacter Injection
OGNL Injection