Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»The top 25 weaknesses in software in 2024

    The top 25 weaknesses in software in 2024

    November 27, 2024

    MITRE recently released its yearly list of the 2024 CWE Top 25 Most Dangerous Software Weaknesses. 

    This list differs from lists that contain the most common vulnerabilities, as it is not a list of vulnerabilities, but rather weaknesses in system design that can be exploited to leverage vulnerabilities. 

    “By definition, code injection is an attack, and when we think about the Top 25 it’s identifying the weaknesses underneath,” said Alec Summers, project leader for the CVE and CWE programs at MITRE. 

    These weaknesses can potentially pave the way for vulnerabilities and attacks, so it’s important to be aware of them and mitigate them as much as possible.

    According to Summers, one trend in this year’s list is that while some weaknesses moved up or down the list, a lot of the weaknesses on the list are classic weaknesses that have been around for years, such as those that enable SQL injection and cross-site scripting.

    “The more you understand these weaknesses, and you draw connections between these things, you can actually start to eliminate whole classes of problems that we see so many times,” he said.

    Addressing these weaknesses not only improves product security, but also has the potential to save companies money because “the more weaknesses we avoid in product development, the less vulnerabilities to manage after deployment,” he explained.

    This year’s list includes the following weaknesses:

    1. Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
    2. Out-of-bounds Write
    3. Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)
    4. Cross-Site Request Forgery (CSRF)
    5. Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
    6. Out-of-bounds Read
    7. Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’)
    8. Use After Free
    9. Missing Authorization
    10. Unrestricted Upload of File with Dangerous Type
    11. Improper Control of Generation of Code (‘Code Injection’)
    12. Improper Input Validation
    13. Improper Neutralization of Special Elements used in a Command (‘Command Injection’)
    14. Improper Authentication
    15. Improper Privilege Management
    16. Deserialization of Untrusted Data
    17. Exposure of Sensitive Information to an Unauthorized Actor
    18. Incorrect Authorization
    19. Server-Side Request Forgery (SSRF)
    20. Improper Restriction of Operations within the Bounds of a Memory Buffer
    21. NULL Pointer Dereference
    22. Use of Hard-coded Credentials
    23. Integer Overflow or Wraparound
    24. Uncontrolled Resource Consumption
    25. Missing Authentication for Critical Function

    The dataset the list is based on includes records for 31,779 Common Vulnerabilities and Exposures (CVEs) published between June 1, 2023 and June 1, 2024. 

    According to Summers, this year, the method in which the list was created was different than in past years because MITRE and CISA involved the broader security community to analyze the dataset, whereas in previous years MITRE’s Common Weakness Enumeration (CWE) team worked alone. 

    This may have resulted in many changes from previous years, and this year’s list only featured three weaknesses that retained the same ranking as last year: #3 Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’), #10 Unrestricted Upload of File with Dangerous Type, and #19 Server-Side Request Forgery (SSRF).

    The weaknesses that had the biggest upward move from last year’s list are #4 Cross-Site Request Forgery, which moved up five ranks; #11 Improper Control of Generation of Code (‘Code Injection’), which moved up 12 ranks; #15 Improper Privilege Management, which moved up seven ranks; and #18 Incorrect Authorization, which moved up six ranks. 

    Weaknesses that moved down in rank significantly include #12 Improper Input Validation, which moved down six ranks; #21 NULL Pointer Dereference, which moved down nine ranks; #23 Integer Overflow or Wraparound, which moved down nine ranks; and #25 Missing Authentication for Critical Function, which moved down five ranks. 

    This year also saw two new entries to the list and two entries that left the Top 25. New entries include #17 Exposure of Sensitive Information to an Unauthorized Actor and #24 Uncontrolled Resource Consumption. Previous entries no longer in the Top 25 are Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’) and Incorrect Default Permissions.

    According to MITRE, one possible cause of the changes is that they did not receive CWE mappings from the U.S. National Vulnerability Database analysts for the CVE records from the first half of 2024. 

    “It is not clear whether these gaps affect the relative rankings, since the distribution of unmapped CVEs seems likely to align roughly with the CWE distribution of the entire data set,” MITRE wrote. 

    The post The top 25 weaknesses in software in 2024 appeared first on SD Times.

    Source: Read More 

    news
    Facebook Twitter Reddit Email Copy Link
    Previous ArticleRomCom exploits Firefox and Windows zero days in the wild
    Next Article SD Times publisher D2 Emerge acquires CodeProject

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 16, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-47916 – Invision Community Themeeditor Remote Code Execution

    May 16, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Ghost in the Shell: Null-AMSI Bypasses Security to Deploy AsyncRAT

    Development

    U.S. Court Slashes $78M Lawyers’ Fee in T-Mobile Data Breach Settlement

    Development

    Microsoft launches free tier for GitHub Copilot — over 150 million developers can now access Claude 3.5 Sonnet or GPT-4o

    Development

    Google launches Gemini 2.5 Flash, and this is what it can do

    Operating Systems

    Highlights

    From Low-Fidelity to High-Fidelity Prototypes

    August 3, 2024

    Mastering the art of prototyping is akin to wielding a powerful toolset that empowers designers…

    State of Devs: A Survey for Every Developer

    May 1, 2025

    5 Tools to Enhance Your AppImage Experience on Linux

    April 2, 2025

    Enhancing AI Model’s Scalability and Performance: A Study on Multi-Head Mixture-of-Experts

    April 25, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.