Improper input validation
Appearance
An editor has nominated this article for deletion. You are welcome to participate in the deletion discussion, which will decide whether or not to retain it. |
![]() | The topic of this article may not meet Wikipedia's general notability guideline. (March 2008) |
String exploits are security exploits involving handling of string data in computer software.[1]
References
- ^ Erickson, Jon (2008). Hacking: the art of exploitation. No Starch Press Series. Safari Books Online. ISBN 9781593271442.
{{cite book}}
: Unknown parameter|Edition=
ignored (|edition=
suggested) (help)