Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
The approach to input validation that simply encodes characters considered "bad" to a format which should not affect the functionality of the application and hence is very weak
Home
Data Handling
The approach to input validation that simply encodes characters considered "bad" to a format which...
0
votes
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
edited
Mar 16, 2021
by
rajeshsharma
The approach to input validation that simply encodes characters considered "bad" to a format which should not affect the functionality of the application and hence is very weak
i) Encrypt bad
ii) Encode bad
iii) Backlisting
#encoding
secure-code-review
DataHandling-questions-answers
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Mar 16, 2021
by
rajeshsharma
Correct Answer is
ii) Encode bad
Your comment on this answer:
Email me at this address if a comment is added after mine:
Email me if a comment is added after mine
Privacy: Your email address will only be used for sending these notifications.
Related questions
0
votes
Q: Attacks that occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#xss-attacks
secure-code-review
DataHandling-questions-answers
0
votes
Q: The _______ approach to validation only permits characters/ASCII ranges defined within a white-list.
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#code-characteristics-range
DataHandling-questions-answers
0
votes
Q: A function in which scripting tags in all dynamic content can be replaced with codes in a chosen character set.
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#dynamic-coding
secure-code-review
DataHandling-questions-answers
0
votes
Q: Defect density alone can be used to judge the security of code accurately.
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#defect-density
secure-code-review
DataHandling-questions-answers
0
votes
Q: The process that gives a person permission to perform a functionality is known as -----------
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
#code-permission
secure-code-review
0
votes
Q: Authorization that restricts the functionality of a subset of users.
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#code-authorization
DataHandling-questions-answers
0
votes
Q: Which function is very similar to lapply?
asked
May 27, 2019
in
Data Handling
by
tempuser
#datahandling
DataHandling-questions-answers
+1
vote
Q: What should be done in case you are not able to log in even after entering the right details and you get no error message in Django?
asked
Apr 4, 2020
in
Data Handling
by
amita rallin
#django-error-message
DataHandling-questions-answers
+1
vote
Q: When the content is very less, we can leverage _________ to display information.
asked
Feb 11, 2020
in
Data Handling
by
miceperry
DataHandling-questions-answers
0
votes
Q: Parameterized stored procedures are compiled after the user input is added.
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
#parameterized-store
secure-code-review
...