fbpx
Wikipedia

Improper input validation

Improper input validation[1] or unchecked user input is a type of vulnerability in computer software that may be used for security exploits.[2] This vulnerability is caused when "[t]he product does not validate or incorrectly validates input that can affect the control flow or data flow of a program."[1]

Examples include:

References edit

  1. ^ a b "CWE-20: Improper Input Validation". Common Weakness Enumeration. MITRE. December 13, 2010. Retrieved February 22, 2011.
  2. ^ Erickson, Jon (2008). Hacking: the art of exploitation. No Starch Press Series (2, illustrated ed.). Safari Books Online. ISBN 978-1-59327-144-2.

improper, input, validation, unchecked, user, input, type, vulnerability, computer, software, that, used, security, exploits, this, vulnerability, caused, when, product, does, validate, incorrectly, validates, input, that, affect, control, flow, data, flow, pr. Improper input validation 1 or unchecked user input is a type of vulnerability in computer software that may be used for security exploits 2 This vulnerability is caused when t he product does not validate or incorrectly validates input that can affect the control flow or data flow of a program 1 Examples include Buffer overflow Cross site scripting Directory traversal Null byte injection SQL injection Uncontrolled format stringReferences edit a b CWE 20 Improper Input Validation Common Weakness Enumeration MITRE December 13 2010 Retrieved February 22 2011 Erickson Jon 2008 Hacking the art of exploitation No Starch Press Series 2 illustrated ed Safari Books Online ISBN 978 1 59327 144 2 nbsp This security software article is a stub You can help Wikipedia by expanding it vte Retrieved from https en wikipedia org w index php title Improper input validation amp oldid 1123501628, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.