Improper input validation
From Infogalactic: the planetary knowledge core
Improper input validation[1] or unchecked user input is a type of vulnerability in computer software that may be used for security exploits.[2]
Examples include:
- Buffer overflow
- Cross-site scripting
- Directory traversal
- Null byte injection
- SQL injection
- Uncontrolled format string
References
<templatestyles src="Reflist/styles.css" />
Cite error: Invalid <references>
tag; parameter "group" is allowed only.
<references />
, or <references group="..." />
<templatestyles src="Asbox/styles.css"></templatestyles>