“…In this paper, the authors discuss websites with improper input validation. Improper input validation is responsible for various types of web application-based attacks such as Cross Site Request Forgery (CSRF) [29], Cross Site Scripting (XSS) [30], Structured Query Language (SQLi) [31], [37] Local File Inclusion [32], [33], Broken Authentications [34], Session Management [35], and Local File Discloser [36]. The authors test SQLi-based attacks to measure the severity of improper input validation of some targeted websites.…”