Improper input validation: Difference between revisions

Content deleted Content added
Ooops. Refs. Actually.
meh - wording? Maybe. *shrug*
Line 5:
{{Notability|date=March 2008}}
'''String exploits''' are [[security exploit]]s involving handling of [[String (computer science)|string]] data in computer software.<ref name=hacking>{{cite book|title=Hacking: the art of exploitation|series=No Starch Press Series|publisher=Safari Books Online|first=Jon|last=Erickson|Edition=2, illustrated|year=2008|ISBN= 9781593271442}}</ref>
 
Examples include:
 
* [[Format string attack]]