Hubbry Logo
search
logo

Improper input validation

logo
Community Hub0 Subscribers
from Wikipedia

Improper input validation[1] or unchecked user input is a type of vulnerability in computer software that may be used for security exploits.[2] This vulnerability is caused when "[t]he product does not validate or incorrectly validates input that can affect the control flow or data flow of a program."[1]

Examples

[edit]

See also

[edit]
  • Input validation – Process of ensuring computer data is both correct and useful
  • Common Weakness Enumeration – Catalog of software weaknesses and vulnerabilities (CWE)

References

[edit]
[edit]
Revisions and contributorsEdit on WikipediaRead on Wikipedia
User Avatar
No comments yet.