Difference between revisions of "Improper input validation"
From Wiki @ Karl Jones dot com
Karl Jones (Talk | contribs) (→See also) |
Karl Jones (Talk | contribs) |
||
Line 1: | Line 1: | ||
'''Improper input validation''' or '''unchecked user input''' is a type of [[vulnerability (computing)|vulnerability]] in [[computer software]] that may be used for [[security exploit]]s. | '''Improper input validation''' or '''unchecked user input''' is a type of [[vulnerability (computing)|vulnerability]] in [[computer software]] that may be used for [[security exploit]]s. | ||
− | |||
− | |||
== Examples == | == Examples == |
Revision as of 12:40, 4 February 2016
Improper input validation or unchecked user input is a type of vulnerability in computer software that may be used for security exploits.
Examples
Examples include:
- Buffer overflow
- Cross-site scripting
- Directory traversal
- Null byte injection
- SQL injection
- Uncontrolled format string
See also
External links
- Improper input validation @ Wikipedia