Input Validation Attacks 0 0

Posted ByVoror

Input validations attacks are when an attacker purposefully sends strange inputs to confuse a web application. Input validation routines serve as the first line of defence for such attacks. Examples of input validation attacks include buffer overflow, directory traversal, cross-site scripting and sql injection.

** The time is base on America/Chicago timezone