Jump to content

Improper input validation

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Shajure (talk | contribs) at 06:26, 22 February 2011 (A source for what they are...). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

String exploits are security exploits involving handling of string data in computer software.Hacking: the art of exploitation. No Starch Press Series. Safari Books Online. 2008. ISBN 9781593271442. {{cite book}}: Unknown parameter |Author= ignored (|author= suggested) (help); Unknown parameter |Edition= ignored (|edition= suggested) (help)