All Injection Attack Vectors
Sunday, February 4th, 2007For my next book, I’m trying to develop a reasonably comprehensive list of technologies which are potentially vulnerable to injection attacks. SQL injection is the most common, but there are of course many others. So far here are the ones I’ve got. What else am I missing?
- SQL
- XPath
- XQuery
- XSLT
- JavaScript
- LDAP