Skip to main content

Table 5 Vulnerabilities by type

From: WNV-Detector: automated and scalable detection of wireless network vulnerabilities

CWE ID Type %
20 Improper Input Validation 12.5
79 Cross-site Scripting 9.4
119 Improper Restriction of Operations 7.4
  within the Bounds of a Memory Buffer  
287 Improper Authentication 6.2
352 Cross-Site Request Forgery 5.8
78 OS Command Injection 5.2
- Insufficient Information 4.8
787 Out-of-bounds Write 4.5
200 Exposure of Sensitive Information 4.3
  to an Unauthorized Actor  
264 Permissions, Privileges, and Access Controls 3.4