These are vulnerabilities present within a program that allow any code to be executed through Injection Attack.