Improper input validation or unchecked user input is a type of vulnerability in computer software that may be used for security exploits. This vulnerability is caused when "[t]he product does not validate or incorrectly validates input that can affect the control flow or data flow of a program."

Examples

Examples include:

See also

  • Input validation – Process of ensuring computer data is both correct and usefulPages displaying short descriptions of redirect targets
  • Common Weakness Enumeration – Catalog of software weaknesses and vulnerabilities (CWE)

External links

  • . OWASP Cheat Sheet Series.
  • . OWASP Foundation.