The SANS TOP 25 is as follows:

The SANS TOP 25 is as follows:


  1. Insufficiently protected credentials: Credentials, such as usernames and passwords, are a valuable target for attackers. If credentials are not properly protected, attackers can use them to gain unauthorized access to systems and data.
  2. Incorrect Permission Assignment for Critical Resource: Critical resources, such as databases and servers, should be protected with appropriate permissions. If permissions are not assigned correctly, attackers may be able to access or modify these resources without authorization.
  3. Improper Restriction of XML External Entity Reference (XXE): XXE is a vulnerability that allows attackers to inject malicious XML code into an application. This can lead to a variety of attacks, such as data theft and denial-of-service.
  4. Server-Side Request Forgery (SSRF): SSRF is a vulnerability that allows attackers to trick an application into making unauthorized requests to other servers. This can be used to steal data, execute arbitrary code, or pivot to other systems on the network.
  5. Improper Neutralization of Special Elements used in a Command (Command Injection): Command injection is a vulnerability that allows attackers to inject arbitrary commands into an application. This can lead to a variety of attacks, such as remote code execution and system takeovers.
  6. Out-of-bounds Write
  7. Improper Neutralization of Special Elements used in an SQL Command (SQL Injection)
  8. Use After Free
  9. Improper Neutralization of Special Elements used in an OS Command (OS Command Injection)
  10. Improper Input Validation
  11. Out-of-bounds Read
  12. Improper Limitation of a Pathname to a Restricted Directory (Path Traversal)
  13. Cross-Site Request Forgery (CSRF)
  14. Unrestricted Upload of File with Dangerous Type
  15. Missing Authorization
  16. NULL Pointer Dereference
  17. Improper Authentication
  18. Integer Overflow or Wraparound
  19. Deserialization of Untrusted Data
  20. Improper Restriction of Operations within the Bounds of a Memory Buffer
  21. Missing Authentication for Critical Function
  22. Concurrent Execution using Shared Resource with Improper Synchronization (Race Condition)
  23. Improper Privilege Management
  24. Improper Control of Generation of Code (Code Injection)
  25. Incorrect Authorization Senselearner Technologies Pvt. Ltd.

要查看或添加评论,请登录

Raviraj Nehul的更多文章

社区洞察

其他会员也浏览了