Difference between revisions of "Improper input validation"
From Wiki @ Karl Jones dot com
Karl Jones (Talk | contribs) (→See also) |
Karl Jones (Talk | contribs) (→External links) |
||
Line 22: | Line 22: | ||
* [https://en.wikipedia.org/wiki/Improper_input_validation Improper input validation] @ Wikipedia | * [https://en.wikipedia.org/wiki/Improper_input_validation Improper input validation] @ Wikipedia | ||
+ | |||
+ | [[Category:Computer science]] | ||
+ | [[Category:Security]] | ||
+ | [[Category:Software]] | ||
+ | [[Category:Software development]] |
Latest revision as of 04:06, 22 April 2016
Improper input validation or unchecked user input is a type of vulnerability in computer software that may be used for security exploits.
Examples
Examples include:
- Buffer overflow
- Cross-site scripting
- Directory traversal
- Null byte injection
- SQL injection
- Uncontrolled format string
See also
External links
- Improper input validation @ Wikipedia