It is a type of vulnerability present in the website in which the hacker can run malicious code or command into the parameter or input field of the web server or website along with normal command or simply the malicious command no matter where the computer or website is geographically located. The code can be a reverse shell code by means of which the hacker can get the reverse connection of the website if the code is run in the web server and can exploit it according to its purpose.