Common Weakness
Editing
Input validation
If we don’t validate input properly, Hacker can alter control flow, change the code execution, or get the Important file informations
Defense
- Consider all the aspect:Value Type / Length / Format / Expired Time / Effect Scope and so on
- Assume all input is malicious, Only accept the thing that we know, That means we only set the whiltlist