How do injection vulnerabilities work?
the attacker tricks victim application into executing code
designed by the attacker.
What is SQL injection?
What is cross-side scripting (XSS)?
What is code injection?
Why are network firewalls not as helpful for web application security
What are the components of a web stack? (4)
What is the difference between stored and reflected XXS?
What is the general rue for protecting against injection attacks?
Never trust user-provided input data