By way of example, an application may have a control panel for every person with distinct language variable settings, which it suppliers in the config file. Attackers can modify the language parameter to inject code to the configuration file, allowing them to execute arbitrary instructions.By embedding hazardous prompts or instructions in inputs to