Glossary of information security: Difference between revisions
Jump to navigation
Jump to search
(Created page with "Glossary of information Security - Information Security Terms {{Template: Draft}} == C == * [https://owasp.org/www-community/attacks/Command_Injection Command Injection] "an attack technique in which an attacker exploits vulnerabilities in an application to inject and execute malicious operating system commands, typically through unvalidated user input such as forms, cookies, or HTTP headers." Category: Glossary Category: Security") |
No edit summary |
||
| Line 4: | Line 4: | ||
== C == | == C == | ||
* [https://owasp.org/www-community/attacks/Code_Injection Code Injection]: "a type of attack in which an attacker injects malicious code into an application and causes it to be executed, typically due to the application's lack of proper validation and filtering of external input data." | |||
* [https://owasp.org/www-community/attacks/Command_Injection Command Injection] "an attack technique in which an attacker exploits vulnerabilities in an application to inject and execute malicious operating system commands, typically through unvalidated user input such as forms, cookies, or HTTP headers." | * [https://owasp.org/www-community/attacks/Command_Injection Command Injection] "an attack technique in which an attacker exploits vulnerabilities in an application to inject and execute malicious operating system commands, typically through unvalidated user input such as forms, cookies, or HTTP headers." | ||
[[Category: Glossary]] | [[Category: Glossary]] | ||
[[Category: Security]] | [[Category: Security]] | ||
[[Category: Revised with LLMs]] | |||
Revision as of 15:31, 21 June 2025
Glossary of information Security - Information Security Terms
C
- Code Injection: "a type of attack in which an attacker injects malicious code into an application and causes it to be executed, typically due to the application's lack of proper validation and filtering of external input data."
- Command Injection "an attack technique in which an attacker exploits vulnerabilities in an application to inject and execute malicious operating system commands, typically through unvalidated user input such as forms, cookies, or HTTP headers."