Accessibility view

Report abuse

How does this content violate the Docs.com Terms of Use?
More information
Harassment is any behavior intended to disturb or upset a person or group of people. Threats include any threat of suicide, violence, or harm to another.
More information
Any image, link, or discussion related to child pornography, child nudity, or other child abuse or exploitation.
More information
Any content of an adult theme, inappropriate, or offensive.
More information
Any link to or advocacy of virus, spyware, malware, or phishing sites.
More information
Any behavior that appears to violate your intellectual property.
More information
Any other inappropriate content or behavior as defined by the Terms of Use.
  • Please provide as much detail as possible about the abuse or offensive behavior you are reporting. Include a contact email address so we can ask for more information if needed.
privacy statement

Sign In

What email address or phone number would you like to use to sign in to Docs.com?
If you already have an account that you use with Office or other Microsoft services, enter it here.

Or sign in with:

Signing in allows you to download and like content, and it provides the authors analytical data about your interactions with their content.

  Docs.com
Sign in
  • Outlook.com
  • People
  • Calendar
  • OneDrive
  • Word Online
  • Excel Online
  • PowerPoint Online
  • OneNote Online
  • Sway
  • Skype
  • Docs.com
  • Office Online
Analytics:
Analytics Summary
Visitors % Avg. completion min Avg. time spent
% Mobile % PC
Activity Highlights
  • Awaiting the first visitor. Once you share this presentation more broadly, you will get detailed visitor activity here (For example, popular slides, types of device used).
Learn more See more
Share:
Share carefully! Anyone who gets this link can view the document and pass along the link.
Share carefully! Anyone who gets this link can view the collection and pass along the link.
Only users who sign in with a work or school account from your organization can view it.

Embed code for collection Untrusted Data Security Risks

Select a layout

  • })" >
  • })" >

Untrusted Data Security Risks

Curated by Rick Anderson
Some APIs are not necessarily appropriate for untrusted input, for instance File.Delete. Some are intuitive like Path.GetFullPath(due to Pass-The-Hash), .NET remoting and BinaryFormatter.
#Curah! #security #untrusted input

To rearrange an item, drag it or select it with the spacebar.

This collection doesn’t have any content yet.

Gather, organize, and share content that interests you.

Loading...Loading...

This site is in read-only mode. To see comments on the site, please go to the Docs.com forum on Disqus.
Change language
Privacy and CookiesLegalTrademarks© 2017 Microsoft