“…jected, without having the user to execute applications to trigger the malicious code execution. Such attacks include "cross-site scripting" (XSS for short) (Yusof and Pathan, 2016) (Yu et al, 2011), malware injection (Khalil et al, 2014), SQL injection (Gruschka and Jensen, 2010;Dessiatnikoff et al, 2011), Javascript injection (Provos et al, 2009), OS commanding (Dessiatnikoff et al, 2011), XPATH injection (Saripalli and Walters, 2010;Dessiatnikoff et al, 2011), LDAP injection (Modi et al, 2013a;Skrupsky et al, 2012).…”