Learn how untrusted data sent to an interpreter can lead to unintended command execution.
Bypass authentication using SQL injection in the login form.
Inject persistent JavaScript through a comment field that executes for all users.