Talk:Improper input validation
Appearance
![]() | This article was nominated for deletion on 22 February 2011 (UTC). The result of the discussion was keep. |
![]() | Computer security: Computing Unassessed | |||||||||||||||||
|
Article titles are singular
I just corrected this one a few days ago. Why de-correct it? If there is a redirect to the wrong name, I missed it and will correct it. Is there some exception to the singular-as-title rule?Shajure (talk) 02:08, 4 March 2011 (UTC)
- Database server lag... the rename / redirect was... odd. Pay no mind.Shajure (talk) 02:11, 4 March 2011 (UTC)
What happened to the word "exploit" in the title
Unscintillating (talk) 20:46, 4 March 2011 (UTC)
- It is gone. The examples given in the article are all examples of vulnerabilities that may lead to exploits; they are not themselves exploits. The term "string exploit" is, moreover, not found as a term of art in the literature. --Lambiam 00:10, 5 March 2011 (UTC)
- Improper input validation can occur within a program built by the programmer that will only be used by the programmer. Therefore, the term does not, as the article says now, define a "vulnerability", since such depends on context. I'm not saying I've studied this issue, but where this has gone isn't making sense. An Asciiz exploit is not something that may "lead" to an exploit, it is an exploit, for example. Unscintillating (talk) 02:42, 5 March 2011 (UTC)
- There just isn't enough here for an article. The name doesn't matter, really, the value here is in making sure that the readers can find what they are seeking.Shajure (talk) 06:15, 5 March 2011 (UTC)
- That is, I see the main value in the various redirects and the article link-outs.Shajure (talk) 06:30, 5 March 2011 (UTC)