Content deleted Content added
A source for what they are... |
drop the opinion, leave the list of articles. |
||
Line 7:
'''String exploits''' are [[security exploit]]s involving handling of [[String (computer science)|string]] data in computer software.{{cite book|title=Hacking: the art of exploitation|series=No Starch Press Series|publisher=Safari Books Online|Author=Jon Erickson|Edition=2, illustrated|year=2008|ISBN= 9781593271442}}
* [[Format string attack]]
* [[Buffer overflow]]
* [[Cross-site scripting]]
* [[Directory traversal]]
* [[SQL injection]]
{{DEFAULTSORT:String Exploits}}
|