Domain 8 - Software Development Security
Domain 8 - Software Development Security
Security
2020 CWE/SANS
[10] CWE‐78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') 16.44
[11] CWE‐190 Integer Overflow or Wraparound 15.81
[12] CWE‐22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') 13.67
[13] CWE‐476 NULL Pointer Dereference 8.35
[14] CWE‐287 Improper Authentication 8.17
[15] CWE‐434 Unrestricted Upload of File with Dangerous Type 7.38
[16] CWE‐732 Incorrect Permission Assignment for Critical Resource 6.95
[17] CWE‐94 Improper Control of Generation of Code ('Code Injection') 6.53
[18] CWE‐522 Insufficiently Protected Credentials 5.49
[19] CWE‐611 Improper Restriction of XML External Entity Reference 5.33
[20] CWE‐798 Use of Hard‐coded Credentials 5.19
[21] CWE‐502 Deserialization of Untrusted Data 4.93
[22] CWE‐269 Improper Privilege Management 4.87
[23] CWE‐400 Uncontrolled Resource Consumption 4.14
[24] CWE‐306 Missing Authentication for Critical Function 3.85
[25] CWE‐862 Missing Authorization 3.77
Defense Command
• The TCB maintains the confidentiality and integrity of each domain and
monitors four basic functions:
o Process activation
o Execution domain switching
o Memory protection
o Input/output operation
COM
DCOM
• View ‐ Virtual relation defined by the database to keep subjects from viewing
certain data
https://cwe.mitre.org
© 2021 CLOUD EDUCATION GROUP LIMITED 115
2020 CWE/SANS Top 25 Most Dangerous
Programming Errors
Rank ID Name
1 CWE‐119 Improper Restriction of Operations within the Bounds of a Memory Buffer
2 CWE‐79 Improper Neutralization of Input During Web Page Generation ('Cross‐site Scripting')
3 CWE‐20 Improper Input Validation
4 CWE‐200 Information Exposure
5 CWE‐125 Out‐of‐bounds Read
6 CWE‐89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
7 CWE‐416 Use After Free
8 CWE‐190 Integer Overflow or Wraparound
9 CWE‐352 Cross‐Site Request Forgery (CSRF)
10 CWE‐22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
11 CWE‐78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
12 CWE‐787 Out‐of‐bounds Write
13 CWE‐287 Improper Authentication
14 CWE‐476 NULL Pointer Dereference
15 CWE‐732 Incorrect Permission Assignment for Critical Resource
16 CWE‐434 Unrestricted Upload of File with Dangerous Type
17 CWE‐611 Improper Restriction of XML External Entity Reference
18 CWE‐94 Improper Control of Generation of Code ('Code Injection')
19 CWE‐798 Use of Hard‐coded Credentials
20 CWE‐400 Uncontrolled Resource Consumption
21 CWE‐772 Missing Release of Resource after Effective Lifetime
22 CWE‐426 Untrusted Search Path
23 CWE‐502 Deserialization of Untrusted Data
24 CWE‐269 Improper Privilege Management
25 CWE‐295 Improper Certificate Validation
• Boot sector virus ‐ A boot sector virus is a common type of virus that
replaces the boot sector with its own code. Since the boot sector executes
every time a computer is started, this type of virus is extremely dangerous.
• Logic bomb ‐ Also called slag code , programming code (typically malicious)
added to the software of an application or operating system that lies
dormant until a predetermined period of time or event occurs, triggering the
code into action