Any change with respect to whitespace is ignored. "Minor"
changes are text changes that only affect capitalization and
punctuation. Most other changes are marked as "Major."
Simple schema changes are treated as Minor, such as the change from
AffectedResource to Affected_Resource in Draft 8, or the relationship
name change from "IsRequiredBy" to "RequiredBy" in
Version 1.0. For each mutual relationship between nodes A and B (such
as ParentOf and ChildOf), a relationship change is noted for both A
and B.
The "Version 4.16 Total" lists the total number of relationships
in Version 4.16. The "Shared" value is the total number of
relationships in entries that were in both Version 4.16 and Version 4.15. The
"New" value is the total number of relationships involving
entries that did not exist in Version 4.15. Thus, the total number of
relationships in Version 4.16 would combine stats from Shared entries and
New entries.
A node change is labeled "important" if it is a major field change and
the field is critical to the meaning of the node. The critical fields
are description, name, and relationships.
| | R |
20 |
Improper Input Validation |
| | R |
22 |
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
| | R |
77 |
Improper Neutralization of Special Elements used in a Command ('Command Injection') |
| | R |
78 |
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') |
| | R |
79 |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
| | R |
89 |
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') |
| | R |
94 |
Improper Control of Generation of Code ('Code Injection') |
D | | R |
119 |
Improper Restriction of Operations within the Bounds of a Memory Buffer |
| | R |
125 |
Out-of-bounds Read |
D | | |
184 |
Incomplete List of Disallowed Inputs |
| | R |
190 |
Integer Overflow or Wraparound |
| | R |
200 |
Exposure of Sensitive Information to an Unauthorized Actor |
D | | |
201 |
Insertion of Sensitive Information Into Sent Data |
| | R |
269 |
Improper Privilege Management |
| | R |
287 |
Improper Authentication |
D | | |
288 |
Authentication Bypass Using an Alternate Path or Channel |
| | R |
306 |
Missing Authentication for Critical Function |
D | | |
307 |
Improper Restriction of Excessive Authentication Attempts |
| | R |
352 |
Cross-Site Request Forgery (CSRF) |
D | | |
359 |
Exposure of Private Personal Information to an Unauthorized Actor |
D | | |
362 |
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') |
| | R |
400 |
Uncontrolled Resource Consumption |
| | R |
416 |
Use After Free |
| | R |
434 |
Unrestricted Upload of File with Dangerous Type |
D | | |
467 |
Use of sizeof() on a Pointer Type |
| | R |
476 |
NULL Pointer Dereference |
D | | R |
502 |
Deserialization of Untrusted Data |
D | | |
532 |
Insertion of Sensitive Information into Log File |
D | | |
601 |
URL Redirection to Untrusted Site ('Open Redirect') |
| | R |
787 |
Out-of-bounds Write |
| | R |
798 |
Use of Hard-coded Credentials |
D | | |
835 |
Loop with Unreachable Exit Condition ('Infinite Loop') |
D | | R |
862 |
Missing Authorization |
D | | R |
863 |
Incorrect Authorization |
D | | R |
918 |
Server-Side Request Forgery (SSRF) |
| | R |
1409 |
Comprehensive Categorization: Injection |
20 |
Improper Input Validation |
|
Major |
Relationships |
|
Minor |
None |
22 |
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
|
Major |
Demonstrative_Examples, Relationships |
|
Minor |
None |
36 |
Absolute Path Traversal |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
74 |
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') |
|
Major |
Demonstrative_Examples, Observed_Examples |
|
Minor |
None |
77 |
Improper Neutralization of Special Elements used in a Command ('Command Injection') |
|
Major |
Demonstrative_Examples, Relationships |
|
Minor |
None |
78 |
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') |
|
Major |
Relationships |
|
Minor |
None |
79 |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
|
Major |
Relationships |
|
Minor |
None |
89 |
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') |
|
Major |
Relationships |
|
Minor |
None |
93 |
Improper Neutralization of CRLF Sequences ('CRLF Injection') |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
94 |
Improper Control of Generation of Code ('Code Injection') |
|
Major |
Mapping_Notes, Relationships |
|
Minor |
None |
113 |
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting') |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
119 |
Improper Restriction of Operations within the Bounds of a Memory Buffer |
|
Major |
Description, Relationships |
|
Minor |
None |
125 |
Out-of-bounds Read |
|
Major |
Observed_Examples, Relationships |
|
Minor |
None |
184 |
Incomplete List of Disallowed Inputs |
|
Major |
Common_Consequences, Description, Diagram, Modes_of_Introduction |
|
Minor |
None |
190 |
Integer Overflow or Wraparound |
|
Major |
Relationships |
|
Minor |
None |
200 |
Exposure of Sensitive Information to an Unauthorized Actor |
|
Major |
Relationships |
|
Minor |
None |
201 |
Insertion of Sensitive Information Into Sent Data |
|
Major |
Description, Diagram, Other_Notes |
|
Minor |
None |
208 |
Observable Timing Discrepancy |
|
Major |
Maintenance_Notes |
|
Minor |
None |
269 |
Improper Privilege Management |
|
Major |
Relationships |
|
Minor |
None |
287 |
Improper Authentication |
|
Major |
Relationships |
|
Minor |
None |
288 |
Authentication Bypass Using an Alternate Path or Channel |
|
Major |
Description, Diagram |
|
Minor |
None |
306 |
Missing Authentication for Critical Function |
|
Major |
Relationships |
|
Minor |
None |
307 |
Improper Restriction of Excessive Authentication Attempts |
|
Major |
Common_Consequences, Description, Diagram |
|
Minor |
None |
346 |
Origin Validation Error |
|
Major |
References |
|
Minor |
None |
347 |
Improper Verification of Cryptographic Signature |
|
Major |
Diagram |
|
Minor |
None |
352 |
Cross-Site Request Forgery (CSRF) |
|
Major |
Relationships |
|
Minor |
None |
359 |
Exposure of Private Personal Information to an Unauthorized Actor |
|
Major |
Description, Diagram, Other_Notes |
|
Minor |
None |
362 |
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') |
|
Major |
Alternate_Terms, Common_Consequences, Description, Diagram, Modes_of_Introduction |
|
Minor |
None |
400 |
Uncontrolled Resource Consumption |
|
Major |
Relationships |
|
Minor |
None |
416 |
Use After Free |
|
Major |
Relationships |
|
Minor |
None |
434 |
Unrestricted Upload of File with Dangerous Type |
|
Major |
Relationships |
|
Minor |
None |
467 |
Use of sizeof() on a Pointer Type |
|
Major |
Description |
|
Minor |
None |
476 |
NULL Pointer Dereference |
|
Major |
Relationships |
|
Minor |
None |
502 |
Deserialization of Untrusted Data |
|
Major |
Common_Consequences, Description, Diagram, Potential_Mitigations, Relationships |
|
Minor |
None |
532 |
Insertion of Sensitive Information into Log File |
|
Major |
Common_Consequences, Description, Diagram |
|
Minor |
None |
601 |
URL Redirection to Untrusted Site ('Open Redirect') |
|
Major |
Alternate_Terms, Common_Consequences, Description, Diagram, Other_Notes |
|
Minor |
None |
750 |
Weaknesses in the 2009 CWE/SANS Top 25 Most Dangerous Programming Errors |
|
Major |
References |
|
Minor |
None |
751 |
2009 Top 25 - Insecure Interaction Between Components |
|
Major |
References |
|
Minor |
None |
752 |
2009 Top 25 - Risky Resource Management |
|
Major |
References |
|
Minor |
None |
753 |
2009 Top 25 - Porous Defenses |
|
Major |
References |
|
Minor |
None |
787 |
Out-of-bounds Write |
|
Major |
Observed_Examples, Relationships |
|
Minor |
None |
798 |
Use of Hard-coded Credentials |
|
Major |
Relationships |
|
Minor |
None |
800 |
Weaknesses in the 2010 CWE/SANS Top 25 Most Dangerous Programming Errors |
|
Major |
References |
|
Minor |
None |
801 |
2010 Top 25 - Insecure Interaction Between Components |
|
Major |
References |
|
Minor |
None |
802 |
2010 Top 25 - Risky Resource Management |
|
Major |
References |
|
Minor |
None |
803 |
2010 Top 25 - Porous Defenses |
|
Major |
References |
|
Minor |
None |
808 |
2010 Top 25 - Weaknesses On the Cusp |
|
Major |
References |
|
Minor |
None |
835 |
Loop with Unreachable Exit Condition ('Infinite Loop') |
|
Major |
Description, Diagram |
|
Minor |
None |
862 |
Missing Authorization |
|
Major |
Common_Consequences, Description, Diagram, Relationships, Terminology_Notes |
|
Minor |
None |
863 |
Incorrect Authorization |
|
Major |
Common_Consequences, Description, Diagram, Relationships, Terminology_Notes |
|
Minor |
None |
864 |
2011 Top 25 - Insecure Interaction Between Components |
|
Major |
References |
|
Minor |
None |
865 |
2011 Top 25 - Risky Resource Management |
|
Major |
References |
|
Minor |
None |
866 |
2011 Top 25 - Porous Defenses |
|
Major |
References |
|
Minor |
None |
867 |
2011 Top 25 - Weaknesses On the Cusp |
|
Major |
References |
|
Minor |
None |
900 |
Weaknesses in the 2011 CWE/SANS Top 25 Most Dangerous Software Errors |
|
Major |
References |
|
Minor |
None |
918 |
Server-Side Request Forgery (SSRF) |
|
Major |
Alternate_Terms, Common_Consequences, Description, Diagram, Observed_Examples, Relationships |
|
Minor |
None |
940 |
Improper Verification of Source of a Communication Channel |
|
Major |
References |
|
Minor |
None |
1200 |
Weaknesses in the 2019 CWE Top 25 Most Dangerous Software Errors |
|
Major |
References |
|
Minor |
None |
1254 |
Incorrect Comparison Logic Granularity |
|
Major |
Demonstrative_Examples, Maintenance_Notes |
|
Minor |
None |
1337 |
Weaknesses in the 2021 CWE Top 25 Most Dangerous Software Weaknesses |
|
Major |
References |
|
Minor |
None |
1350 |
Weaknesses in the 2020 CWE Top 25 Most Dangerous Software Weaknesses |
|
Major |
References |
|
Minor |
None |
1387 |
Weaknesses in the 2022 CWE Top 25 Most Dangerous Software Weaknesses |
|
Major |
References |
|
Minor |
None |
1391 |
Use of Weak Credentials |
|
Major |
Observed_Examples |
|
Minor |
None |
1392 |
Use of Default Credentials |
|
Major |
Observed_Examples |
|
Minor |
None |
1409 |
Comprehensive Categorization: Injection |
|
Major |
Relationships |
|
Minor |
None |
1425 |
Weaknesses in the 2023 CWE Top 25 Most Dangerous Software Weaknesses |
|
Major |
References |
|
Minor |
None |