Improper Input Validation
The main goal when writing a computer program is to develop a solution to a problem. Though that solution may resolve the immediate problem, it is important to be mindful that there could be security issues that have not been considered. One cause of the potiential secure issues, such as unauthorized access to sensitive data is Impoper Input Validation. Improper Input Validation is when a program does not properly validate the input that it receives.
Example Software
Relevant Common Weakness Enumerations (CWEs)
Relevant Common Vulnerabilities and Exposures (CVEs)
-
Reference
- Author’s Explnanation. If the linked reference is down, you may access the archived version its web archive.
Replication
- The team’s replication (video)