5.2.2 Injection flaws, particularly SQL injection (validate input to verify user data cannot modify meaning of commands and queries). Also consider LDAP and Xpath injection flaws, as well as other injection flaws.
5.2.2 Injection flaws, particularly SQL injection (validate input to verify user data cannot modify meaning of commands and queries). Also consider LDAP and Xpath injection flaws, as well as other injection flaws.