Injections (Advanced)

Beyond SQL injection — LDAP, XXE, CRLF, email header, log, and template injection attacks. Different vectors, same principle: untrusted input in trusted contexts.

6 vulnerabilities