SQL Injections

Command Injection Vulnerabilities

Lightweight Directory Access Protocol (LDAP) Injection Vulnerabilities

Source: Cisco Certified Ethical Hacker Course