Content deleted Content added
avoid confusion (see talk) |
name the vulnerability, not the attack |
||
Line 1:
'''Improper input validation'''<ref>{{cite web |work=[[Common Weakness Enumeration]] |publisher=[[MITRE]] |title=CWE-20: Improper Input Validation |url=http://cwe.mitre.org/data/definitions/20.html |date=December 13, 2010 |accessdate=February 22, 2011}}</ref> or '''unchecked user
input''' is a type of [[vulnerability (computing)|vulnerability]] in [[computer software]] that may be used for [[security exploit]]s.<ref name=hacking>{{cite book|title=Hacking: the art of exploitation|series=No Starch Press Series|publisher=Safari Books Online|first=Jon|last=Erickson|Edition=2, illustrated|year=2008|ISBN= 9781593271442}}</ref> Examples include:
* [[Buffer overflow]]
* [[Cross-site scripting]]
* [[Directory traversal]]
* [[SQL injection]]
* [[Uncontrolled format string]]
▲* [[Null byte injection]]<ref>
== References ==
|