From Wikipedia, the free encyclopedia

Improper input validation [1] or unchecked user input is a type of vulnerability in computer software that may be used for security exploits. [2] This vulnerability is caused when "[t]he product does not validate or incorrectly validates input that can affect the control flow or data flow of a program." [1]

Examples include:

References

  1. ^ a b "CWE-20: Improper Input Validation". Common Weakness Enumeration. MITRE. December 13, 2010. Retrieved February 22, 2011.
  2. ^ Erickson, Jon (2008). Hacking: the art of exploitation. No Starch Press Series (2, illustrated ed.). Safari Books Online. ISBN  978-1-59327-144-2.
From Wikipedia, the free encyclopedia

Improper input validation [1] or unchecked user input is a type of vulnerability in computer software that may be used for security exploits. [2] This vulnerability is caused when "[t]he product does not validate or incorrectly validates input that can affect the control flow or data flow of a program." [1]

Examples include:

References

  1. ^ a b "CWE-20: Improper Input Validation". Common Weakness Enumeration. MITRE. December 13, 2010. Retrieved February 22, 2011.
  2. ^ Erickson, Jon (2008). Hacking: the art of exploitation. No Starch Press Series (2, illustrated ed.). Safari Books Online. ISBN  978-1-59327-144-2.

Videos

Youtube | Vimeo | Bing

Websites

Google | Yahoo | Bing

Encyclopedia

Google | Yahoo | Bing

Facebook