Types of improper input validation vulnerability
- en buffer overflow vulnerability (n) ➜
- en cache poisoning vulnerability (n) ➜
- en directory access vulnerability (n) ➜
- en file creation vulnerability (n) ➜
- en hyperlink command execution vulnerability (n) ➜
- en insecure data storage vulnerability (n) ➜
- en ip disclosure vulnerability (n) ➜
- en unauthorized command execution vulnerability (n) ➜
- en unauthorized data upload vulnerability (n) ➜
- en unauthorized file download vulnerability (n) ➜
- en unauthorized file upload vulnerability (n) ➜
Links to other resources
- sw.opencyc.org /2012/05/10/concept/en/VulnerableBecauseOfImproperInputValidation