Expanding on this, rather than look for each specific vulnerability, developers must take one very simple concept to heart and consider it when writing the portions of their application that deal with processing input, regardless of where is it received from.