Wikipedia:Articles for deletion/String exploits: Difference between revisions

Content deleted Content added
m Fix Linter errors.
m Ignore this (I'm making a minor change to fix a lint) Tag matching.
 
Line 22:
*'''Keep'''. As rewritten described below it's fine. [[User:Elizium23|Elizium23]] ([[User talk:Elizium23|talk]]) 02:19, 20 February 2011 (UTC)
*'''Comment'''  Google search on "Asciiz exploit" produces hits.  "Comment character exploit" also shows some hits such as [http://www.techrepublic.com/article/secure-sql-server-encryption-and-sql-injection-attacks/5083541 this one].  So this may not be a question of "is this notable", since the idea of "exploits using strings" seems to be both notable and interesting, but "is this salvageable".  Have all of the major editors been notified? [[User:Unscintillating|Unscintillating]] ([[User talk:Unscintillating|talk]]) 04:45, 20 February 2011 (UTC)
*:Strange, I find no Google search results for [http://www.google.com/search?rls=en&q=%22Comment+character+exploit%22 <ttcode>["Comment character exploit"<nowiki>]</nowiki></code>] (with quotes). The link you give is about SQL injection, on which we do have [[SQL injection|an article]]. The present article is so unclear that I'm not sure what the topic is, but it may be an attempt to create an article about "Unchecked user input", as it is called in our article on [[Vulnerability (computing)]], or "Improper input validation", as it is called in the [[Common Weakness Enumeration]] repository (entry [http://cwe.mitre.org/data/definitions/20.html CWE-20]). This is definitely a notable topic, but content-wise the present article [[String exploits]] is unsalvageable. &nbsp;--[[User talk:Lambiam|Lambiam]] 09:38, 20 February 2011 (UTC)
*::Seconded; it might in principle be a notable topic but the content would have to be redone from scratch. I think it's probably best to redirect it, until anybody ever actually manages to write encyclopaedic content on this subject. [[User:Bobrayner|bobrayner]] ([[User talk:Bobrayner|talk]]) 23:24, 20 February 2011 (UTC)
*'''Delete''' By itself it is not notable, and the article only discusses concatenation without highlighting how this, by itself, is an exploit. I believe that other articles such as [[Vulnerability (computing)]] already cover this area. --[[User:HighKing|HighKing]] ([[User talk:HighKing|talk]]) 11:58, 21 February 2011 (UTC)