Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities: Difference between revisions
Jump to navigation
Jump to search
Programsam (talk | contribs) |
Programsam (talk | contribs) |
||
| Line 33: | Line 33: | ||
== 10. End Notes == | == 10. End Notes == | ||
# Input validation vulnerabilities occur when a system does not assert that input falls within an acceptable range, allowing the system to be exploited perform unintended functionality. | |||
# http://cwe.mitre.org/top25/ | |||
# http://www.sans.org/critical-security-controls/#summary | |||
# | |||