Top Software Weaknesses Exposed: MITRE’s Latest Report Highlights Key Security Threats

Software weaknesses can make attackers exploit your systems and they can steal sensitive data for malicious activities. Software weaknesses refers to all the bugs, errors or flaws in your system that can make it vulnerable. MITRE disclosed top 25 software weaknesses that many companies encountered between June 2023 to June 2024.

To rank the top 25 software weaknesses, MITRE analyzed 31,770 CVE records that compromised different systems. MITRE said that organizations should look closely at their lists to review their software security strategies. The top software weakness reported by MITRE is cross-site scripting, followed by Out-of-bounds Write. SQL Injection is the third biggest software weakness. Software weaknesses named CSRF, Path Traversal, Use After Free and Missing Authorization were also some top software vulnerabilities.


CISA also regularly releases documents about software vulnerabilities called Secure by Design. In May and March, it published two more documents to notify tech executives to look out for some vulnerabilities reported in recent attacks. The NSA, FBI and Five Eyes cyber security teams also released a list of top 15 security vulnerabilities. If you need to know more about the list of top 25 software weaknesses, check the whole report by MITRE.

RankVulnerability TypeRisk ScoreCVEs (Security Issues)Change in Rank
1Cross-site Scripting (XSS)56.923+1
2Out-of-bounds Write45.2018-1
3SQL Injection35.884No Change
4Cross-Site Request Forgery (CSRF)19.570+5
5Path Traversal12.744+3
6Out-of-bounds Read11.423+1
7OS Command Injection11.305-2
8Use After Free10.195-4
9Missing Authorization10.110+2
10Unrestricted Upload of Dangerous File10.030No Change
11Code Injection7.137+12
12Improper Input Validation6.781-6
13Command Injection6.744+3
14Improper Authentication5.944-1
15Improper Privilege Management5.220+7
16Deserialization of Untrusted Data5.075-1
17Exposure of Sensitive Information5.070+13
18Incorrect Authorization4.052+6
19Server-Side Request Forgery (SSRF)4.052No Change
20Improper Memory Buffer Operations3.692-3
21NULL Pointer Dereference3.580-9
22Use of Hard-coded Credentials3.462-4
23Integer Overflow or Wraparound3.373-9
24Uncontrolled Resource Consumption3.230+13
25Missing Authentication for Critical Function2.735-5

Read next:

• How to Start Your Journey As a Graphic Designer

• A New Research Shows Many People Get their News Updates from Influencers on Social Media

• ChatGPT Leads, Google Gemini, Microsoft CoPilot, and Meta AI Gain Ground in AI Tool Usage
Previous Post Next Post