From: WNV-Detector: automated and scalable detection of wireless network vulnerabilities
CWE ID | Type | % |
---|---|---|
20 | Improper Input Validation | 12.5 |
79 | Cross-site Scripting | 9.4 |
119 | Improper Restriction of Operations | 7.4 |
 | within the Bounds of a Memory Buffer |  |
287 | Improper Authentication | 6.2 |
352 | Cross-Site Request Forgery | 5.8 |
78 | OS Command Injection | 5.2 |
- | Insufficient Information | 4.8 |
787 | Out-of-bounds Write | 4.5 |
200 | Exposure of Sensitive Information | 4.3 |
 | to an Unauthorized Actor |  |
264 | Permissions, Privileges, and Access Controls | 3.4 |