These definitions are used within this document: Ensure that data is not only validated, but business rule correct.
You can create a password in different ways, it's structure may be simple, reasonable or strong.
An email address identifies an email box to which email messages are delivered.
A wide variety of formats were used in early email systems, but only a single format is used today, following the standards developed for Internet mail systems since the 1980s.
To ensure that the application is robust against all forms of input data, whether obtained from the user, infrastructure, external entities or database systems. This weakness leads to almost all of the major vulnerabilities in applications, such as Interpreter Injection, locale/Unicode attacks, file system attacks and buffer overflows.
All sections should be reviewed The most common web application security weakness is the failure to properly validate input from the client or environment.