Category:Injection exploits: Difference between revisions
Appearance
Content deleted Content added
+link |
|||
Line 1: | Line 1: | ||
{{Portal|Computer security}} |
{{Portal|Computer security}} |
||
''Injection exploits'' are computer exploits that use some input or data entry feature to introduce some kind of data or code that subverts the intended operation of the system. Usually these exploits exploit vulnerabilities resulting from insufficient data validation on input and so forth. |
''Injection exploits'' are computer exploits that use some input or data entry feature to introduce some kind of data or code that subverts the intended operation of the system. Usually these exploits exploit vulnerabilities resulting from insufficient [[data validation]] on input and so forth. |
||
[[Category:Computer security exploits]] |
[[Category:Computer security exploits]] |
Revision as of 16:32, 1 February 2010
Injection exploits are computer exploits that use some input or data entry feature to introduce some kind of data or code that subverts the intended operation of the system. Usually these exploits exploit vulnerabilities resulting from insufficient data validation on input and so forth.
Pages in category "Injection exploits"
The following 22 pages are in this category, out of 22 total. This list may not reflect recent changes.