Category:Injection exploits
![]() | Computing portal |
Here is a list of articles in the category Injection exploits of the Computing portal that unifies foundations of mathematics and computations using computers.
![]() |
Wikimedia Commons has media related to Injection exploits. |
Injection exploits are computer exploits that use some input or data entry feature to introduce some kind of data or code that subverts the intended operation of the system. Usually these exploits exploit vulnerabilities resulting from insufficient data validation on input and so forth.
Pages in category "Injection exploits"
The following 22 pages are in this category, out of 22 total.
A
- Alphanumeric shellcode (computing)
- Arbitrary code execution (computing)
- Armitage (computing) (software)
B
- Broker injection (computing)
C
- Code injection (computing)
- CPLINK (computing)
- Cross-site scripting (computing)
E
- Email injection (computing)
F
- File inclusion vulnerability (computing)
- Frame injection (computing)
I
- Inter-protocol exploitation (computing)
L
- LDAP injection (computing)
M
- Metasploit Project (organization)
N
- Null byte injection (computing)
O
- OWASP ZAP (software)
P
- PLA Unit 61398 (computing)
R
- Reflected DOM Injection (computing)
S
- Shellcode (computing)
- Shellshock (software bug) (computing)
- SQL injection (computing)
V
- Vulnerability (computing) (computing)
X
- XSS worm (computing)