Jump to content

Improper input validation

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Helpful Pixie Bot (talk | contribs) at 14:10, 9 May 2012 (ISBNs (Build KE)). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Improper input validation[1] or unchecked user input is a type of vulnerability in computer software that may be used for security exploits.[2]

Examples include:

References

  1. ^ "CWE-20: Improper Input Validation". Common Weakness Enumeration. MITRE. December 13, 2010. Retrieved February 22, 2011.
  2. ^ Erickson, Jon (2008). Hacking: the art of exploitation. No Starch Press Series. Safari Books Online. ISBN 978-1-59327-144-2. {{cite book}}: Unknown parameter |Edition= ignored (|edition= suggested) (help)