Jump to content

Talk:Improper input validation

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Shajure (talk | contribs) at 06:30, 5 March 2011 (What happened to the word "exploit" in the title). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
WikiProject iconComputer security: Computing Unassessed
WikiProject iconThis article is within the scope of WikiProject Computer security, a collaborative effort to improve the coverage of computer security on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
???This article has not yet received a rating on Wikipedia's content assessment scale.
???This article has not yet received a rating on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computing.
Things you can help WikiProject Computer security with:
Article alerts are available, updated by AAlertBot. More information...
  • Review importance and quality of existing articles
  • Identify categories related to Computer Security
  • Tag related articles
  • Identify articles for creation (see also: Article requests)
  • Identify articles for improvement
  • Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
  • Find editors who have shown interest in this subject and ask them to take a look here.

Article titles are singular

I just corrected this one a few days ago. Why de-correct it? If there is a redirect to the wrong name, I missed it and will correct it. Is there some exception to the singular-as-title rule?Shajure (talk) 02:08, 4 March 2011 (UTC)[reply]

Database server lag... the rename / redirect was... odd. Pay no mind.Shajure (talk) 02:11, 4 March 2011 (UTC)[reply]

What happened to the word "exploit" in the title

Unscintillating (talk) 20:46, 4 March 2011 (UTC)[reply]

It is gone. The examples given in the article are all examples of vulnerabilities that may lead to exploits; they are not themselves exploits. The term "string exploit" is, moreover, not found as a term of art in the literature.  --Lambiam 00:10, 5 March 2011 (UTC)[reply]
Improper input validation can occur within a program built by the programmer that will only be used by the programmer. Therefore, the term does not, as the article says now, define a "vulnerability", since such depends on context.  I'm not saying I've studied this issue, but where this has gone isn't making sense.  An Asciiz exploit is not something that may "lead" to an exploit, it is an exploit, for example.  Unscintillating (talk) 02:42, 5 March 2011 (UTC)[reply]
There just isn't enough here for an article. The name doesn't matter, really, the value here is in making sure that the readers can find what they are seeking.Shajure (talk) 06:15, 5 March 2011 (UTC)[reply]
That is, I see the main value in the various redirects and the article link-outs.Shajure (talk) 06:30, 5 March 2011 (UTC)[reply]