Please enable JavaScript to use CodeHS

NCMF: 5.3.1c

CodeHS Lessons

A software vulnerability may exist when data is allowed to include unauthorized control instructions that dictate how the program should behave and thus can cause the program to behave in a way that violates the security policy.

Standard
8.2 Assessing Risks
Standard
12.2 Assessing Risks
Standard
13.2 Assessing Risks
Standard
16.2 Assessing Risks
Standard
13.2 Assessing Risks