Jump to content

Category:Injection exploits

From Wikipedia, the free encyclopedia
This is the current revision of this page, as edited by BrownHairedGirl (talk | contribs) at 04:03, 10 July 2019 (remove links to deleted portals). The present address (URL) is a permanent link to this version.
(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)

Injection exploits are computer exploits that use some input or data entry feature to introduce some kind of data or code that subverts the intended operation of the system. Usually these exploits exploit vulnerabilities resulting from insufficient data validation on input and so forth.