CWE

Common Weakness Enumeration

A community-developed list of SW & HW weaknesses that can become vulnerabilities

New to CWE? click here!
CWE Most Important Hardware Weaknesses
CWE Top 25 Most Dangerous Weaknesses
Home > CWE Top 25 > 2024  
ID

2024 CWE Top 25 Most Dangerous Software Weaknesses

Share via:
  1. Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
    CWE-79 CVEs in KEV: 3 Rank Last Year: 2 (up 1) upward trend
  2. Out-of-bounds Write
    CWE-787 CVEs in KEV: 18 Rank Last Year: 1 (down 1) downward trend
  3. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
    CWE-89 CVEs in KEV: 4 Rank Last Year: 3
  4. Cross-Site Request Forgery (CSRF)
    CWE-352 CVEs in KEV: 0 Rank Last Year: 9 (up 5) upward trend
  5. Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
    CWE-22 CVEs in KEV: 4 Rank Last Year: 8 (up 3) upward trend
  6. Out-of-bounds Read
    CWE-125 CVEs in KEV: 3 Rank Last Year: 7 (up 1) upward trend
  7. Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
    CWE-78 CVEs in KEV: 5 Rank Last Year: 5 (down 2) downward trend
  8. Use After Free
    CWE-416 CVEs in KEV: 5 Rank Last Year: 4 (down 4) downward trend
  9. Missing Authorization
    CWE-862 CVEs in KEV: 0 Rank Last Year: 11 (up 2) upward trend
  10. Unrestricted Upload of File with Dangerous Type
    CWE-434 CVEs in KEV: 0 Rank Last Year: 10
  11. Improper Control of Generation of Code ('Code Injection')
    CWE-94 CVEs in KEV: 7 Rank Last Year: 23 (up 12) upward trend
  12. Improper Input Validation
    CWE-20 CVEs in KEV: 1 Rank Last Year: 6 (down 6) downward trend
  13. Improper Neutralization of Special Elements used in a Command ('Command Injection')
    CWE-77 CVEs in KEV: 4 Rank Last Year: 16 (up 3) upward trend
  14. Improper Authentication
    CWE-287 CVEs in KEV: 4 Rank Last Year: 13 (down 1) downward trend
  15. Improper Privilege Management
    CWE-269 CVEs in KEV: 0 Rank Last Year: 22 (up 7) upward trend
  16. Deserialization of Untrusted Data
    CWE-502 CVEs in KEV: 5 Rank Last Year: 15 (down 1) downward trend
  17. Exposure of Sensitive Information to an Unauthorized Actor
    CWE-200 CVEs in KEV: 0 Rank Last Year: 30 (up 13) upward trend
  18. Incorrect Authorization
    CWE-863 CVEs in KEV: 2 Rank Last Year: 24 (up 6) upward trend
  19. Server-Side Request Forgery (SSRF)
    CWE-918 CVEs in KEV: 2 Rank Last Year: 19
  20. Improper Restriction of Operations within the Bounds of a Memory Buffer
    CWE-119 CVEs in KEV: 2 Rank Last Year: 17 (down 3) downward trend
  21. NULL Pointer Dereference
    CWE-476 CVEs in KEV: 0 Rank Last Year: 12 (down 9) downward trend
  22. Use of Hard-coded Credentials
    CWE-798 CVEs in KEV: 2 Rank Last Year: 18 (down 4) downward trend
  23. Integer Overflow or Wraparound
    CWE-190 CVEs in KEV: 3 Rank Last Year: 14 (down 9) downward trend
  24. Uncontrolled Resource Consumption
    CWE-400 CVEs in KEV: 0 Rank Last Year: 37 (up 13) upward trend
  25. Missing Authentication for Critical Function
    CWE-306 CVEs in KEV: 5 Rank Last Year: 20 (down 5) downward trend
Page Last Updated: November 20, 2024