Vulnerabilities > Acceptance of Extraneous Untrusted Data With Trusted Data