Menu
Home Explore People Places Arts History Plants & Animals Science Life & Culture Technology
On this page
Improper input validation

Improper input validation or unchecked user input is a type of vulnerability in computer software that may be used for security exploits. This vulnerability is caused when "[t]he product does not validate or incorrectly validates input that can affect the control flow or data flow of a program."

Examples include:

We don't have any images related to Improper input validation yet.
We don't have any YouTube videos related to Improper input validation yet.
We don't have any PDF documents related to Improper input validation yet.
We don't have any Books related to Improper input validation yet.
We don't have any archived web articles related to Improper input validation yet.

References

  1. "CWE-20: Improper Input Validation". Common Weakness Enumeration. MITRE. December 13, 2010. Retrieved February 22, 2011. http://cwe.mitre.org/data/definitions/20.html

  2. Erickson, Jon (2008). Hacking: the art of exploitation. No Starch Press Series (2, illustrated ed.). Safari Books Online. ISBN 978-1-59327-144-2. 978-1-59327-144-2

  3. "CWE-20: Improper Input Validation". Common Weakness Enumeration. MITRE. December 13, 2010. Retrieved February 22, 2011. http://cwe.mitre.org/data/definitions/20.html