Difference between revisions of "Improper input validation"
From Wiki @ Karl Jones dot com
Karl Jones (Talk | contribs) (Created page with "'''Improper input validation''' or '''unchecked user input''' is a type of vulnerability in computer software that may be used for security...") |
Karl Jones (Talk | contribs) (→See also) |
||
Line 17: | Line 17: | ||
* [[Common Weakness Enumeration]] | * [[Common Weakness Enumeration]] | ||
+ | * [[Exploit (computer security)]] | ||
* [[Security exploit]] | * [[Security exploit]] | ||
Revision as of 04:03, 24 September 2015
Improper input validation or unchecked user input is a type of vulnerability in computer software that may be used for security exploits.
(TO DO: expand, organize, cross-reference, illustrate.)
Examples
Examples include:
- Buffer overflow
- Cross-site scripting
- Directory traversal
- Null byte injection
- SQL injection
- Uncontrolled format string
See also
External links
- Improper input validation @ Wikipedia