TOP 25 SECURITY VULNERABILITIES SANS
TOP 25 SECURITY VULNERABILITIES SANS
These vulnerabilities are created through multiple surveys and individual interviews with developers, senior security analysts and researchers. See detailed description of each in their link.
1Injection flawsCWE-79: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection'): https://cwe.mitre.org/data/definitions/89.html)
2Broken authentication and session managementCWE-306: Missing Authentication for Critical Function: https://cwe.mitre.org/data/definitions/306.html
3Cross-site scripting (XSS)CWE-79: Improper Neutralization of Special Elements used in an HTML Output: https://cwe.mitre.org/data/definitions/79.html
4Insecure direct object referencesCWE-690: Broken or Missing Authorization Check for Direct Object Reference: https://cwe.mitre.org/data/definitions/863.html
5Security misconfigurationCWE-200: Information Leakage and Improper Disclosure of Sensitive Data: https://cwe.mitre.org/data/definitions/200.html
6Sensitive data exposureCWE-311: Missing Encryption of Sensitive Data: https://cwe.mitre.org/data/definitions/311.html
7Cross-site request forgery (CSRF)CWE-352: Cross-Site Request Forgery (CSRF): https://cwe.mitre.org/data/definitions/352.html)
8Using components with known vulnerabilitiesCWE-125: Outdated or Unmaintained Components: https://cwe.mitre.org/data/definitions/125.html
9Failure to restrict URL accessCWE-288: Authentication Bypass by Capture of Native Credentials: https://cwe.mitre.org/data/definitions/288.html
10Insufficient logging and monitoringCWE-285: Improper Access Control of System Files: https://cwe.mitre.org/data/definitions/285.html
11Cross-origin resource sharing (CORS) misconfigurationCWE-20: Improper Input Validation: https://cwe.mitre.org/data/definitions/20.html
12Insecure communicationsCWE-250: Execution with Insufficient Privileges: https://cwe.mitre.org/data/definitions/250.html
13XML external entity (XXE) injectionCWE-611: Improper Restriction of XML External Entity Reference: https://cwe.mitre.org/data/definitions/611.html
14Improper error handlingCWE-754: Improper Check for Unusual or Unexpected Data: https://cwe.mitre.org/data/definitions/754.html
15Insecure encryption key managementCWE-329: Not Using Cryptographically Secure Random Numbers: https://cwe.mitre.org/data/definitions/338.html
16Insufficient security controls in cloud environmentsCWE-113: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'): https://cwe.mitre.org/data/definitions/78.html)
17Improper input validationCWE-264: Permissions, Privileges, and Access Controls: https://cwe.mitre.org/data/definitions/264.html
18Out-of-bounds readCWE-126: Buffer Overflows: https://cwe.mitre.org/data/definitions/126.html
19Out-of-bounds writeCWE-126: Buffer Overflows: https://cwe.mitre.org/data/definitions/126.html
20Use after freeCWE-416: Use of Pointer after it has been Freed: https://cwe.mitre.org/data/definitions/416.html
21Improper limitation of a path name to a restricted directory ('Path Traversal')[CWE-22: Path Traversal: '...'])
Comments
Post a Comment