3.1 SQL injection; 3.2 HTML Script Injection; 3.3 Dynamic evaluation vulnerabilities; 3.4 Object injection; 3.5 Remote file injection; 3.6 Shell injection. 4 See also ...
www.google.com.tw