Description

MITRE, an American not-for-profit organization, created a list of the top 25 most dangerous software weaknesses CWE (Common Weakness Enumeration) of the year 2022 after analyzing 37899 CVEs based on the prevalence and severity of NIST's National Vulnerability Database and CISA's Known Exploited Vulnerabilities Catalog. According to experts, flaws, vulnerabilities, bugs, and errors found in software solution’s architecture, design and implementation potentially expose systems to cyber-attacks that can take control of affected devices, trigger a Denial-of-service condition, and access sensitive information. The following description describes about MITRE's top 25 most dangerous software weaknesses: 1. CWE-787: Out-of-bounds write 2. CWE-79: Improper neutralization of input during web page generation 3. CWE-89: Improper neutralization of special elements used in an SQL command 4. CWE-20: Improper Input Validation 5. CWE-125: Out-of-bounds read 6. CWE-78: Improper neutralization of special elements used in an OS command 7. CWE-416: Use After Free 8. CWE-22: Improper limitation of a pathname to a restricted directory 9. CWE-352: Cross-Site Request Forgery 10. CWE-434: Unrestricted upload of file with dangerous type 11. CWE-476: NULL pointer dereference 12. CWE-502: Deserialization of untrusted data 13. CWE-190: Integer overflow or wraparound 14. CWE-287: Improper authentication 15. CWE-798: Use of hard-coded credentials 16. CWE-862: Missing authorization 17. CWE-77: Improper neutralization of special elements used in a command 18. CWE-306: Missing authentication for critical function 19. CWE-119: Improper restriction of operations within the bounds of a memory buffer 20. CWE-276: Incorrect default permissions 21. CWE-918: Server-Side Request Forgery 22. CWE-362: Concurrent execution using shared resource with improper synchronization 23. CWE-400: Uncontrolled resource consumption 24. CWE-611: Improper restriction of XML external entity reference 25. CWE-94: Improper control of generation of code In April 2022, in collaboration with the FBI and the NSA, security agencies also released a list of the top 15 flaws actively exploited by hackers in 2021.