Improper input validation: Difference between revisions

Content deleted Content added
m moved String exploits to String exploit: Singular title
add ref for "exploit string"
Line 4:
<!-- End of AfD message, feel free to edit beyond this point -->
{{Notability|date=March 2008}}
A '''string exploit''' is a [[security exploit]] involving handling of [[String (computer science)|string]] data in computer software.<ref name=hacking>{{cite book|title=Hacking: the art of exploitation|series=No Starch Press Series|publisher=Safari Books Online|first=Jon|last=Erickson|Edition=2, illustrated|year=2008|ISBN= 9781593271442}}</ref><ref>
{{cite web
| url = http://www.derkeiler.com/pdf/Mailing-Lists/securityfocus/pen-test/2003-02/0152.pdf
| title = SecurityFocus penetration: The Building of an exploit string
| date = February 27, 2003
| publisher = derkeiler.com
| accessdate = February 22, 2011
}}
</ref>
 
Examples include: