Sponsored Links

Minggu, 12 November 2017

Sponsored Links

CWE Common Weakness Enumeration. CWE-20: Improper Input Validation ...
src: images.slideplayer.es

Improper input validation or unchecked user input is a type of vulnerability in computer software that may be used for security exploits.

Examples include:

  • Buffer overflow
  • Cross-site scripting
  • Directory traversal
  • Null byte injection
  • SQL injection
  • Uncontrolled format string

Video Improper input validation



References

Source of the article : Wikipedia

Comments
0 Comments