Difference between revisions of "Improper input validation"
From Wiki @ Karl Jones dot com
Karl Jones (Talk | contribs) |
Karl Jones (Talk | contribs) (→External links) |
||
(One intermediate revision by the same user not shown) | |||
Line 17: | Line 17: | ||
* [[Exploit (computer security)]] | * [[Exploit (computer security)]] | ||
* [[Security exploit]] | * [[Security exploit]] | ||
+ | * [[Software defect]] | ||
== External links == | == External links == | ||
* [https://en.wikipedia.org/wiki/Improper_input_validation Improper input validation] @ Wikipedia | * [https://en.wikipedia.org/wiki/Improper_input_validation Improper input validation] @ Wikipedia | ||
+ | |||
+ | [[Category:Computer science]] | ||
+ | [[Category:Security]] | ||
+ | [[Category:Software]] | ||
+ | [[Category:Software development]] |
Latest revision as of 04:06, 22 April 2016
Improper input validation or unchecked user input is a type of vulnerability in computer software that may be used for security exploits.
Examples
Examples include:
- Buffer overflow
- Cross-site scripting
- Directory traversal
- Null byte injection
- SQL injection
- Uncontrolled format string
See also
External links
- Improper input validation @ Wikipedia