APPLICATIONS VULNERABILITIES CAUSED BY INCORRECT INPUT DATA

M. V. Kolomytsev, S. A. Nosok

Abstract


Different kinds of vulnerabilities typical for applications without sufficient input data control are discussed in this article. Typical characteristics of such vulnerabilities are given and elimination recommendations are proposed.

Keywords


vulnerability, applications, correct data, incorrect data.

GOST Style Citations






DOI: https://doi.org/10.15588/1607-3274-2011-1-7



Copyright (c) 2014 M. V. Kolomytsev, S. A. Nosok

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Address of the journal editorial office:
Editorial office of the journal «Radio Electronics, Computer Science, Control»,
Zaporizhzhya National Technical University, 
Zhukovskiy street, 64, Zaporizhzhya, 69063, Ukraine. 
Telephone: +38-061-769-82-96 – the Editing and Publishing Department.
E-mail: rvv@zntu.edu.ua

The reference to the journal is obligatory in the cases of complete or partial use of its materials.