Threats and Countermeasures Patterns
From Guidance Share
[edit]
Attack Patterns
[edit]
Design Patterns
[edit]
Implementation Patterns
- White List Input
- Black List Input
- Type Safe SQL
- Escaping Special SQL Characters
- SQL Query Concatenation
[edit]
Vulnerability Patterns
- Buffer Overflow Vulnerability Pattern
- Integer Overflow Vulnerability Pattern
- SQL Injection Vulnerability Pattern
[edit]
Templates for Patterns