SQL Injections
Command Injection Vulnerabilities
Lightweight Directory Access Protocol (LDAP) Injection Vulnerabilities
Source: Cisco Certified Ethical Hacker Course