<s>
Improper	B-Application
input	I-Application
validation	I-Application
or	O
unchecked	B-Application
user	I-Application
input	I-Application
is	O
a	O
type	O
of	O
vulnerability	O
in	O
computer	B-Application
software	I-Application
that	O
may	O
be	O
used	O
for	O
security	O
exploits	O
.	O
</s>
