A computer attack based on insufficient validation of an incoming XML file. If the system is able to receive data in this format, a link to external objects or local resources of the target system can be inserted by an… Read Full Article