Examples of using User input in English and their translations into Russian
{-}
-
Official
-
Colloquial
This defect undermines taint propagation, which is sometimes used to ensure that unvalidated user input does not reach sensitive code.
Improper input validation or unchecked user input is a type of vulnerability in computer software that may be used for security exploits.
Markus Opahle discovered that the Extbase database layer was not correctly sanitizing user input when using the Query object model.
does not properly validate user input used as a part of an SQL query.
sends back user input from keyboard, mouse, or touchscreen.
A northbound interface is typically an output-only interface(as opposed to one that accepts user input) found in carrier-grade network
with optimized routines to protect file servers silently without any user input needed.
Particular attention is paid to exceptional situations- this code deals with a user input, while it has a key impact on the tournament outcome.
Chris Evans discovered that mimeTeX contained certain directives that may be unsuitable for handling untrusted user input.
This is accomplished by the application taking user input and combining it with static parameters to build an SQL query.
For example, these same State Data Centers have been a principle conduit for getting user input to develop the data plan for census 2000.
The smbclient utility contains a formatstring vulnerability where commands dealing with file names treat user input as format strings to asprintf.
the following message instead of the file tree:"The project requires user input.
did not correctly validate user input.
Specify the maximum amount of time that an active Remote Desktop Services session can be idle(without user input) before the session is automatically disconnected or ended.
currently undertaken by FAO, but plans had been under consideration to permit user input through a secure Internet site.
other data formats, improperly validated user input prior to deserializing: following DSA-4004-1 for CVE-2017-7525, an additional set of classes was identified as unsafe for deserialization.
requires user input or is set to run in user context.
which is intended to allow users to generate the required dB-difference windows based on user input of model parameters
when developers generate html options tags manually, user input concatenated with manually built tags may not be escaped