0 Replies - 1692 Views - Last Post: 01 July 2011 - 08:44 AM

#1 modi123_1   User is online

  • Suitor #2
  • member icon

Reputation: 14096
  • View blog
  • Posts: 56,495
  • Joined: 12-June 08

2011 CWE/SANS Top 25 Most Dangerous Software Errors

Posted 01 July 2011 - 08:44 AM



The 2011 CWE/SANS Top 25 Most Dangerous Software Errors is a list of the most widespread and critical errors that can lead to serious vulnerabilities in software. They are often easy to find, and easy to exploit. They are dangerous because they will frequently allow attackers to completely take over the software, steal data, or prevent the software from working at all.

Hmmm... a pretty damning list. I've know I have been guilty of a few of these myself, but they get caught in testing or on code reviews.

Is anyone else guilty? How does your work handle catching these, or have they come back and bit you in rear?


  • Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
  • Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
  • Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
  • Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
  • Missing Authentication for Critical Function
  • Missing Authorization
  • Use of Hard-coded Credentials
  • Missing Encryption of Sensitive Data
  • Unrestricted Upload of File with Dangerous Type
  • Reliance on Untrusted Inputs in a Security Decision
  • Execution with Unnecessary Privileges
  • Cross-Site Request Forgery (CSRF)
  • Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
  • Download of Code Without Integrity Check
  • Incorrect Authorization
  • Inclusion of Functionality from Untrusted Control Sphere
  • Incorrect Permission Assignment for Critical Resource
  • Use of Potentially Dangerous Function
  • Use of a Broken or Risky Cryptographic Algorithm
  • Incorrect Calculation of Buffer Size
  • Improper Restriction of Excessive Authentication Attempts
  • URL Redirection to Untrusted Site ('Open Redirect')
  • Uncontrolled Format String
  • Integer Overflow or Wraparound
  • Use of a One-Way Hash without a Salt

Is This A Good Question/Topic? 0
  • +

Page 1 of 1