Difference between revisions of "Improper input validation"

From Wiki @ Karl Jones dot com
Jump to: navigation, search
(External links)
 
(One intermediate revision by the same user not shown)
Line 17: Line 17:
 
* [[Exploit (computer security)]]
 
* [[Exploit (computer security)]]
 
* [[Security exploit]]
 
* [[Security exploit]]
 +
* [[Software defect]]
  
 
== External links ==
 
== External links ==
  
 
* [https://en.wikipedia.org/wiki/Improper_input_validation Improper input validation] @ Wikipedia
 
* [https://en.wikipedia.org/wiki/Improper_input_validation Improper input validation] @ Wikipedia
 +
 +
[[Category:Computer science]]
 +
[[Category:Security]]
 +
[[Category:Software]]
 +
[[Category:Software development]]

Latest revision as of 04:06, 22 April 2016

Improper input validation or unchecked user input is a type of vulnerability in computer software that may be used for security exploits.

Examples

Examples include:

See also

External links