src: images.slideplayer.es
Improper input validation or unchecked user input is a type of vulnerability in computer software that may be used for security exploits.
Examples include:
- Buffer overflow
- Cross-site scripting
- Directory traversal
- Null byte injection
- SQL injection
- Uncontrolled format string
Video Improper input validation
References
Source of the article : Wikipedia