CF application vulnerabilities
CF application vulnerabilities
No data returned by the browser should be trusted! (Form, URL, CGI, Cookie)
Use data-type checking whenever possible. (Val(), CFQUERYPARAM, CFSTOREDPROC)
Filter input for code (<>, JavaScript).
For a guide to input filtering, look at the CERT site and the input filters available from the Developers Gallery.
Home
Speakers
Maps & Hotels
Photos
CF Conf Central
Please send comments/questions to
[email protected]