14,957
edits
(Created page with "Glossary of information Security - Information Security Terms {{Template: Draft}} == C == * [https://owasp.org/www-community/attacks/Command_Injection Command Injection] "an attack technique in which an attacker exploits vulnerabilities in an application to inject and execute malicious operating system commands, typically through unvalidated user input such as forms, cookies, or HTTP headers." Category: Glossary Category: Security") |
No edit summary |
||
| Line 4: | Line 4: | ||
== C == | == C == | ||
* [https://owasp.org/www-community/attacks/Code_Injection Code Injection]: "a type of attack in which an attacker injects malicious code into an application and causes it to be executed, typically due to the application's lack of proper validation and filtering of external input data." | |||
* [https://owasp.org/www-community/attacks/Command_Injection Command Injection] "an attack technique in which an attacker exploits vulnerabilities in an application to inject and execute malicious operating system commands, typically through unvalidated user input such as forms, cookies, or HTTP headers." | * [https://owasp.org/www-community/attacks/Command_Injection Command Injection] "an attack technique in which an attacker exploits vulnerabilities in an application to inject and execute malicious operating system commands, typically through unvalidated user input such as forms, cookies, or HTTP headers." | ||
[[Category: Glossary]] | [[Category: Glossary]] | ||
[[Category: Security]] | [[Category: Security]] | ||
[[Category: Revised with LLMs]] | |||