Examples of using Input validation in English and their translations into Russian
{-}
-
Official
-
Colloquial
DSA-2597-1 rails-- input validation error.
Description: A memory corruption issue was addressed through improved input validation.
Insufficient input validation could result in redirecting or leading a user to another website.
DSA-2613-1 rails-- insufficient input validation.
Input validation with whitelists, not blacklists which attempt to list known-bad values.
DSA-2214-1 ikiwiki-- missing input validation.
Multiple input validations in the decoders for QDM2, VP5, VP6, VMD and SVQ1 files could lead to the execution of arbitrary code.
This function contains a vulnerability where input validation may be bypassed.
Missing user input validation in the access tracking mechanism could lead to arbitrary URL redirection.
Most likely V1010 diagnostic will match the CWE-20 identifier Improper Input Validation.
The gmp plugin in strongSwan had insufficient input validation when verifying RSA signatures.
Andy Lutomirski discovered that tcsd(the TPM userspace daemon)was missing input validation.
You can no longer use table names for cell ranges in the Input validation dialog box because Excel cannot handle this.
Improper input validation or unchecked user input is a type of vulnerability in computer software that may be used for security exploits.
Matt Lewis discovered that Subversion performs insufficient input validation of svndiff streams.
It was discovered that missing input validation in the twikidraw and anywikidraw actions can result in the execution of arbitrary code.
Matthew Daley discovered that squid, a web proxy cache,does not properly perform input validation when parsing requests.
Dan Rosenberg discovered that insufficient input validation in VLC's processing of Matroska/WebM containers could lead to the execution of arbitrary code.
Matthew Daley discovered that Squid3, a fully featured web proxy cache,did not properly perform input validation in request parsing.
Olivier Fourdan discovered that missing input validation in the Xserver's handling of XkbSetGeometry requests may result in an information leak or denial of service.
The latter is for programmers: visual components are placed on the canvas andprogrammer is able to write code for input validation, background calls to the engine etc.
Several integer overflows and missing input validations were discovered in the ImageMagick image manipulation suite, resulting in the execution of arbitrary code or denial of service.
It was discovered that the host manager servlet performed insufficient input validation, which could lead to a cross-site scripting attack.
Insufficient input validation in the Speex implementation used by this version of xine enables an invalid array access and the execution of arbitrary code by supplying a maliciously crafted Speex file.
Malicious editors with user creation permission could escalate theirprivileges by creating new users in arbitrary groups, due to lack of input validation in the taskcenter.
When using Fail2ban to monitor Apache logs,improper input validation in log parsing could enable a remote attacker to trigger an IP ban on arbitrary addresses, thus causing a denial of service.
Loganaden Velvindron and Gleb Smirnoff discovered that the SIOCSIFADDR, SIOCSIFBRDADDR, SIOCSIFDSTADDR andSIOCSIFNETMASK ioctl requests do not perform input validation or verify the caller's credentials.
When using Fail2ban to monitor Postfix or Cyrus IMAP logs,improper input validation in log parsing could enable a remote attacker to trigger an IP ban on arbitrary addresses, resulting in denial of service.
Several vulnerabilities were found in Mantis, a web-based bug tracking system:Insufficient input validation could result in local file inclusion and cross-site scripting.
Owing to the lack of input validation and connecting to the database on behalf of a superuser or the one who can create users, the attacker may create a superuser in your database.