Which of the following attack can be eradicated by filtering improper XML syntax?