According to the OWASP Guide, unvalidated input is the most common weakness found in web applications. Tainted input leads to almost all other vulnerabilities in these environments (OWASP, 2005). Before we look at how to prevent this weakness from spreading throughout your web solutions, letís examine the potential threats to your business when tainted input is allowed to reach your processing components.
This document is in PDF format. To view it click here.