0 / 60 seg.

Which attack exploits input validation vulnerabilities?