Problem
1. Define an injection attack. List some examples of injection attacks. What are the general circumstances in which injection attacks are found?
2. State the similarities and differences between command injection and SQL injection attacks.
3. Define a cross-site scripting attack. List an example of such an attack.