SQL Injection: Attackers inject SQL commands into queries to manipulate databases
NoSQL Injection: Similar to SQL Injection, but targets NoSQL databases like MongoDB, allowing attackers to modify or access unauthorized data
OS Command Injection: Malicious commands are injected into an operating system-level call, giving attackers control over the server
LDAP Injection: Attackers manipulate LDAP queries to modify or extract information from directory services, such as user credentials
ORM Injection: Object-Relational Mapping (ORM) frameworks used to interact with databases can be exploited to retrieve unauthorized records or execute unsafe queries
Expression Language Injection: Malicious input is executed within dynamic templates using expression languages like JSP, allowing attackers to execute unauthorized commands
OGNL Injection: OGNL (Object Graph Navigation Library) injections are used in frameworks to inject malicious expressions, typically affecting Java-based web applications