- 93.8% Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
- 83.3% Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
- 79.0% Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
- 77.7% Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
- 76.9% Missing Authentication for Critical Function
- 76.8% Missing Authorization
- 75.0% Use of Hard-coded Credentials
- 75.0% Missing Encryption of Sensitive Data
- 74.0% Unrestricted Upload of File with Dangerous Type
- 73.8% Reliance on Untrusted Inputs in a Security Decision
- 73.1% Execution with Unnecessary Privileges
- 70.1% Cross-Site Request Forgery (CSRF)
- 69.3% Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
- 68.5% Download of Code Without Integrity Check
- 67.8% Incorrect Authorization
- 66.0% Inclusion of Functionality from Untrusted Control Sphere
- 65.5% Incorrect Permission Assignment for Critical Resource
- 64.6% Use of Potentially Dangerous Function
- 64.1% Use of a Broken or Risky Cryptographic Algorithm
- 62.4% Incorrect Calculation of Buffer Size
- 61.5% Improper Restriction of Excessive Authentication Attempts
- 61.1% URL Redirection to Untrusted Site ('Open Redirect')
- 61.0% Uncontrolled Format String
- 60.3% Integer Overflow or Wraparound
- 59.9% Use of a One-Way Hash without a Salt
Sunday, July 10, 2011
25 Most Dangerous Software Errors
FWIW, these are the 25 most dangerous software errors, according to CWE/SANS.
Subscribe to:
Post Comments (Atom)
Here is a Google app that actually teaches XSS and SQL injection:
ReplyDeletehttps://google-gruyere.appspot.com/