Talk:Improper input validation

From Wikipedia, the free encyclopedia
Jump to: navigation, search
WikiProject Computer Security / Computing  (Rated Stub-class, Low-importance)
WikiProject icon This article is within the scope of WikiProject Computer Security, a collaborative effort to improve the coverage of computer security on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Stub-Class article Stub  This article has been rated as Stub-Class on the project's quality scale.
 Low  This article has been rated as Low-importance on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computing.
 

Article titles are singular[edit]

I just corrected this one a few days ago. Why de-correct it? If there is a redirect to the wrong name, I missed it and will correct it. Is there some exception to the singular-as-title rule?Shajure (talk) 02:08, 4 March 2011 (UTC)

Database server lag... the rename / redirect was... odd. Pay no mind.Shajure (talk) 02:11, 4 March 2011 (UTC)

What happened to the word "exploit" in the title[edit]

Unscintillating (talk) 20:46, 4 March 2011 (UTC)

It is gone. The examples given in the article are all examples of vulnerabilities that may lead to exploits; they are not themselves exploits. The term "string exploit" is, moreover, not found as a term of art in the literature.  --Lambiam 00:10, 5 March 2011 (UTC)
Improper input validation can occur within a program built by the programmer that will only be used by the programmer. Therefore, the term does not, as the article says now, define a "vulnerability", since such depends on context.  I'm not saying I've studied this issue, but where this has gone isn't making sense.  An Asciiz exploit is not something that may "lead" to an exploit, it is an exploit, for example.  Unscintillating (talk) 02:42, 5 March 2011 (UTC)
Because you piped the link, which is to the article Null character, which doesn't discuss that exploit but only states that a certain kind of vulnerability "can lead to security exploits". To avoid confusion, I've replaced the link. If you take the ENISA definition of vulnerability (given in our article): "The existence of a weakness, design, or implementation error that can lead to an unexpected, undesirable event", such events do not have to be due to a malicious attack and could also happen if the vulnerable software is not meant for public use but the programmer/user makes an unintentional input error. Likewise for the definitions by The Open Group, ISACA, and several other sources quoted in the article.  --Lambiam 14:40, 5 March 2011 (UTC)
There just isn't enough here for an article. The name doesn't matter, really, the value here is in making sure that the readers can find what they are seeking.Shajure (talk) 06:15, 5 March 2011 (UTC)
That is, I see the main value in the various redirects and the article link-outs.Shajure (talk) 06:30, 5 March 2011 (UTC)
The name is not supported by the sources, it needs to say something like (and I'm not thrilled with this) "Input-validation vulnerability".  Unscintillating (talk) 16:10, 8 March 2011 (UTC)