According to OWASP, the most critical type of vulnerability found in web applications is the injection of some type of code, such as SQL injection, OS command injection, and HTML injection.
These vulnerabilities are usually caused by a poor input validation by the application. In this recipe, we will cover some of the best practices to use when processing user inputs and constructing queries that make use of them.