Difference between revisions of "Improper input validation"
From Wiki @ Karl Jones dot com
Karl Jones (Talk | contribs) |
Karl Jones (Talk | contribs) (→See also) |
||
Line 17: | Line 17: | ||
* [[Exploit (computer security)]] | * [[Exploit (computer security)]] | ||
* [[Security exploit]] | * [[Security exploit]] | ||
+ | * [[Software defect]] | ||
== External links == | == External links == | ||
* [https://en.wikipedia.org/wiki/Improper_input_validation Improper input validation] @ Wikipedia | * [https://en.wikipedia.org/wiki/Improper_input_validation Improper input validation] @ Wikipedia |
Revision as of 12:42, 4 February 2016
Improper input validation or unchecked user input is a type of vulnerability in computer software that may be used for security exploits.
Examples
Examples include:
- Buffer overflow
- Cross-site scripting
- Directory traversal
- Null byte injection
- SQL injection
- Uncontrolled format string
See also
External links
- Improper input validation @ Wikipedia