Glossary of information security: Difference between revisions

Jump to navigation Jump to search
no edit summary
(Created page with "Glossary of information Security - Information Security Terms {{Template: Draft}} == C == * [https://owasp.org/www-community/attacks/Command_Injection Command Injection] "an attack technique in which an attacker exploits vulnerabilities in an application to inject and execute malicious operating system commands, typically through unvalidated user input such as forms, cookies, or HTTP headers." Category: Glossary Category: Security")
 
No edit summary
Line 4: Line 4:


== C ==
== C ==
* [https://owasp.org/www-community/attacks/Code_Injection Code Injection]: "a type of attack in which an attacker injects malicious code into an application and causes it to be executed, typically due to the application's lack of proper validation and filtering of external input data."
* [https://owasp.org/www-community/attacks/Command_Injection Command Injection] "an attack technique in which an attacker exploits vulnerabilities in an application to inject and execute malicious operating system commands, typically through unvalidated user input such as forms, cookies, or HTTP headers."
* [https://owasp.org/www-community/attacks/Command_Injection Command Injection] "an attack technique in which an attacker exploits vulnerabilities in an application to inject and execute malicious operating system commands, typically through unvalidated user input such as forms, cookies, or HTTP headers."


[[Category: Glossary]]
[[Category: Glossary]]
[[Category: Security]]
[[Category: Security]]
[[Category: Revised with LLMs]]

Navigation menu