TOP 25 SECURITY VULNERABILITIES SANS

 

TOP 25 SECURITY VULNERABILITIES SANS



These vulnerabilities are created through multiple surveys and individual interviews with developers, senior security analysts and researchers. See detailed description of each in their link.


1Injection flawsCWE-79: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection'): https://cwe.mitre.org/data/definitions/89.html)

2Broken authentication and session managementCWE-306: Missing Authentication for Critical Function: https://cwe.mitre.org/data/definitions/306.html

3Cross-site scripting (XSS)CWE-79: Improper Neutralization of Special Elements used in an HTML Output: https://cwe.mitre.org/data/definitions/79.html

4Insecure direct object referencesCWE-690: Broken or Missing Authorization Check for Direct Object Reference: https://cwe.mitre.org/data/definitions/863.html

5Security misconfigurationCWE-200: Information Leakage and Improper Disclosure of Sensitive Data: https://cwe.mitre.org/data/definitions/200.html

6Sensitive data exposureCWE-311: Missing Encryption of Sensitive Data: https://cwe.mitre.org/data/definitions/311.html

7Cross-site request forgery (CSRF)CWE-352: Cross-Site Request Forgery (CSRF): https://cwe.mitre.org/data/definitions/352.html)

8Using components with known vulnerabilitiesCWE-125: Outdated or Unmaintained Components: https://cwe.mitre.org/data/definitions/125.html

9Failure to restrict URL accessCWE-288: Authentication Bypass by Capture of Native Credentials: https://cwe.mitre.org/data/definitions/288.html

10Insufficient logging and monitoringCWE-285: Improper Access Control of System Files: https://cwe.mitre.org/data/definitions/285.html

11Cross-origin resource sharing (CORS) misconfigurationCWE-20: Improper Input Validation: https://cwe.mitre.org/data/definitions/20.html

12Insecure communicationsCWE-250: Execution with Insufficient Privileges: https://cwe.mitre.org/data/definitions/250.html

13XML external entity (XXE) injectionCWE-611: Improper Restriction of XML External Entity Reference: https://cwe.mitre.org/data/definitions/611.html

14Improper error handlingCWE-754: Improper Check for Unusual or Unexpected Data: https://cwe.mitre.org/data/definitions/754.html

15Insecure encryption key managementCWE-329: Not Using Cryptographically Secure Random Numbers: https://cwe.mitre.org/data/definitions/338.html

16Insufficient security controls in cloud environmentsCWE-113: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'): https://cwe.mitre.org/data/definitions/78.html)

17Improper input validationCWE-264: Permissions, Privileges, and Access Controls: https://cwe.mitre.org/data/definitions/264.html

18Out-of-bounds readCWE-126: Buffer Overflows: https://cwe.mitre.org/data/definitions/126.html

19Out-of-bounds writeCWE-126: Buffer Overflows: https://cwe.mitre.org/data/definitions/126.html

20Use after freeCWE-416: Use of Pointer after it has been Freed: https://cwe.mitre.org/data/definitions/416.html

21Improper limitation of a path name to a restricted directory ('Path Traversal')[CWE-22: Path Traversal: '...'])

Comments

Popular posts from this blog

OWASP Top 10 Vulnerabilities

CSI Linux: A Powerful Linux Distribution for Digital Forensics, Malware Analysis, creating of report and OSINT

CSI Linux: A New Linux Distribution For Cyber and OSINT Investigation