Requirement 6.5.2

Injection flaws, particularly SQL injection. Also consider LDAP and Xpath injection flaws as well as other injection flaws.