The term injection can encompass a large number of different variations such as SQL, XML, LDAP, HTML, CSS and Remote file injections (which is not an exhaustive list). In the end, they all boil down to injecting a command in the guise of data, where the command is then executed with malicious results on the targeted system. This is all a result of what the Open Web Application Security Project has identified as Injection Flaws.
We're going to take a look at what OWASP has identified as their #1 most critical web application security flaw: injection flaws.