Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities: Difference between revisions

Line 33: Line 33:


== 10. End Notes ==
== 10. End Notes ==
# Input validation vulnerabilities occur when a system does not assert that input falls within an acceptable range, allowing the system to be exploited perform unintended functionality.
# http://cwe.mitre.org/top25/
# http://www.sans.org/critical-security-controls/#summary
#