Skip to main content

Table 5 Vulnerabilities by type

From: WNV-Detector: automated and scalable detection of wireless network vulnerabilities

CWE ID

Type

%

20

Improper Input Validation

12.5

79

Cross-site Scripting

9.4

119

Improper Restriction of Operations

7.4

 

within the Bounds of a Memory Buffer

 

287

Improper Authentication

6.2

352

Cross-Site Request Forgery

5.8

78

OS Command Injection

5.2

-

Insufficient Information

4.8

787

Out-of-bounds Write

4.5

200

Exposure of Sensitive Information

4.3

 

to an Unauthorized Actor

 

264

Permissions, Privileges, and Access Controls

3.4