Introduction Injection vulnerabilities occur when un-trusted data is sent to an interpreter as part of a command or query, leading.