About: Improper input validation     Goto   Sponge   NotDistinct   Permalink

An Entity of Type : yago:YagoPermanentlyLocatedEntity, within Data Space : dbpedia.demo.openlinksw.com associated with source document(s)
QRcode icon
http://dbpedia.demo.openlinksw.com/describe/?url=http%3A%2F%2Fdbpedia.org%2Fresource%2FImproper_input_validation&invfp=IFP_OFF&sas=SAME_AS_OFF

Improper input validation or unchecked user input is a type of vulnerability in computer software that may be used for security exploits. This vulnerability is caused when "[t]he product does not validate or incorrectly validates input that can affect the control flow or data flow of a program." Examples include: * Buffer overflow * Cross-site scripting * Directory traversal * Null byte injection * SQL injection * Uncontrolled format string

AttributesValues
rdf:type
rdfs:label
  • Improper input validation (en)
  • 부적절한 입력 검증 (ko)
  • Неправильная проверка ввода (ru)
  • 不適當的輸入驗證 (zh)
rdfs:comment
  • Improper input validation or unchecked user input is a type of vulnerability in computer software that may be used for security exploits. This vulnerability is caused when "[t]he product does not validate or incorrectly validates input that can affect the control flow or data flow of a program." Examples include: * Buffer overflow * Cross-site scripting * Directory traversal * Null byte injection * SQL injection * Uncontrolled format string (en)
  • 부적절한 입력 검증 (Improper input validation)은 컴퓨터 소프트웨어에서 취약점 공격을 하는데 사용될 수 있는 보안 취약점의 한 종류이다. 예를 들면 다음과 같다: * 버퍼 오버플로 * 사이트 간 스크립팅 * * * SQL 삽입 * 포맷 스트링 버그 (ko)
  • Неправильная проверка ввода, или непроверенный пользовательский ввод — это вид уязвимости в программном обеспечении, который может использоваться в качестве эксплоита. Примеры: * Переполнение буфера * Межсайтовый скриптинг * * * SQL-инъекция * (ru)
  • 不適當輸入驗證(Improper input validation)或未檢查使用者輸入(unchecked user input)是软件中可能會被利用的漏洞。此漏洞是指「程式沒有驗證(或是以不正確方式驗證)可能會影響程式資料流或是控制流的輸入。」 例子包括有: * 缓冲区溢出 * 跨網站指令碼 * 目录遍历 * 空字元注入 * SQL注入 * (zh)
dcterms:subject
Wikipage page ID
Wikipage revision ID
Link from a Wikipage to another Wikipage
sameAs
dbp:wikiPageUsesTemplate
has abstract
  • Improper input validation or unchecked user input is a type of vulnerability in computer software that may be used for security exploits. This vulnerability is caused when "[t]he product does not validate or incorrectly validates input that can affect the control flow or data flow of a program." Examples include: * Buffer overflow * Cross-site scripting * Directory traversal * Null byte injection * SQL injection * Uncontrolled format string (en)
  • 부적절한 입력 검증 (Improper input validation)은 컴퓨터 소프트웨어에서 취약점 공격을 하는데 사용될 수 있는 보안 취약점의 한 종류이다. 예를 들면 다음과 같다: * 버퍼 오버플로 * 사이트 간 스크립팅 * * * SQL 삽입 * 포맷 스트링 버그 (ko)
  • Неправильная проверка ввода, или непроверенный пользовательский ввод — это вид уязвимости в программном обеспечении, который может использоваться в качестве эксплоита. Примеры: * Переполнение буфера * Межсайтовый скриптинг * * * SQL-инъекция * (ru)
  • 不適當輸入驗證(Improper input validation)或未檢查使用者輸入(unchecked user input)是软件中可能會被利用的漏洞。此漏洞是指「程式沒有驗證(或是以不正確方式驗證)可能會影響程式資料流或是控制流的輸入。」 例子包括有: * 缓冲区溢出 * 跨網站指令碼 * 目录遍历 * 空字元注入 * SQL注入 * (zh)
gold:hypernym
prov:wasDerivedFrom
page length (characters) of wiki page
foaf:isPrimaryTopicOf
is Link from a Wikipage to another Wikipage of
is Wikipage redirect of
is foaf:primaryTopic of
Faceted Search & Find service v1.17_git139 as of Feb 29 2024


Alternative Linked Data Documents: ODE     Content Formats:   [cxml] [csv]     RDF   [text] [turtle] [ld+json] [rdf+json] [rdf+xml]     ODATA   [atom+xml] [odata+json]     Microdata   [microdata+json] [html]    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 08.03.3330 as of Mar 19 2024, on Linux (x86_64-generic-linux-glibc212), Single-Server Edition (378 GB total memory, 67 GB memory in use)
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2024 OpenLink Software