For instance, an application may have a user interface for each user with unique language variable settings, which it suppliers inside a config file. Attackers can modify the language parameter to inject code in to the configuration file, allowing them to execute arbitrary instructions.Detect the problems that are made, or explanation why sufferers