Identify the injection attack represented in the diagram below:
XPath Injection Attack
XML Request Attack
XML Injection Attack
Frame Injection Attack
Submit