[<prev] [next>] [day] [month] [year] [list]
Message-ID: <Pine.GSO.4.51.0610041918280.10829@faron.mitre.org>
Date: Wed, 4 Oct 2006 19:19:01 -0400 (EDT)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: bugtraq@...urityfocus.com
Subject: Vulnerability Type Distributions in CVE
(note: HTML versions of the tables in this paper are included on the
web site, whose URL is given below. Some mailing list programs seem
to be mishandling the encoding of the HTML tables, or rejecting them
due to size constraints.)
==========================================================
Vulnerability Type Distributions in CVE
==========================================================
Author: Steve Christey
Date: October 4, 2006
Document version: 1.0
URL: http://cwe.mitre.org/documents/vuln-trends.html
This is a draft report and does not represent an official position of
The MITRE Corporation. Copyright (c) 2006, The MITRE Corporation. All
rights reserved. Permission is granted to redistribute this document
if this paragraph is not removed. This document is subject to change
without notice.
=============================
===== Table of Contents =====
=============================
Introduction
Summary of Results
Data Sets
Trend Table Color Key
Table 1 Analysis: Overall Trends
Table 2 and 3 Analysis: OS vs. non-OS
Table 4 Analysis: Open and Closed Source
Possible Future Work
Notes on Potential Bias
(In)Frequently Asked Questions
Credits
References
Flaw Terminology
Table 1: Overall Results
Table 2: OS Vendors
Table 3: OS Vendors vs. Others
Table 4: Open and Closed Source (OS vendors)
========================
===== Introduction =====
========================
For the past 5 years, CVE has been tracking the types of errors that
lead to publicly reported vulnerabilities, and periodically reporting
trends on a limited scale. In support of the Common Weakness
Enumeration (CWE) project [1], and as a result of the interest in this
work as mentioned during the "Year of the web application: Hack & Data
from the Front lines" panel at the 5th Annual Cyber Security Executive
Summit in New York City on September 13, 2006, we have published a
more extensive analysis. An updated version will be released once
2006 is complete.
The primary goal of this study is to better understand research trends
using publicly reported vulnerabilities. It should be noted that the
data is obtained from an uncontrolled population, i.e., decentralized
public reports from a research community with diverse goals and
interests, with an equally diverse set of vendors and developers.
More specialized, exhaustive, and repeatable methods could be devised
to evaluate software security. But until such methods reach maturity
and widespread acceptance, the overall state of software security can
be viewed through the lens of public reports.
==============================
===== Summary of Results =====
==============================
1) The total number of publicly reported web application
vulnerabilities has risen sharply, to the point where they have
overtaken buffer overflows. This is probably due to ease of
detection and exploitation of web vulnerabilities, combined with
the proliferation of low-grade software applications. In 2005 and
2006, cross-site scripting (XSS) was number 1, and SQL injection
was number 2. PHP remote file inclusion is number 3 in 2006;
because it allows arbitrary code execution on a vulnerable server,
this is a worrisome trend, although proper configuration is
frequently enough to eliminate it.
2) Buffer overflows are still the number 1 issue as reported in
operating system (OS) vendor advisories. XSS is still high in this
category, at number 2 in 2005 and number 3 in 2006, although other
web application vulnerabilities appear much less frequently.
3) Integer overflows, barely in the top 10 overall in the past few
years, are in the top 3 for OS vendor advisories. This might
indicate expert researcher interest in high-profile software.
4) There are noticeable differences in the types of vulnerabilities
being reported in open and closed source OS vendor advisories.
These merit further investigation because they might reflect
important differences in development, research, and disclosure
practices.
5) The data is inconclusive regarding whether there is a concrete
improvement in overall software security. While there is a rise in
"new" vulnerability classes, the raw numbers for older classes have
not changed significantly. Further investigation is also required
in this area.
=====================
===== Data Sets =====
=====================
Three main data sets were used in this analysis.
OVERALL: this data set consists of all CVEs that were first publicly
reported in 2001 or later (earlier CVEs do not have the appropriate
fields filled out.) CVE includes all types of software, whether from
a major vendor or an individual hobbyist programmer, as long as the
associated vulnerability has been reported by the developer or posted
by a researcher or third party to sources such as mailing lists and
vulnerability databases. CVE only includes distributable software,
i.e., it does not include issues that are reported for custom software
in specific web sites. While CVE data is incomplete, it is estimated
that it is 80% complete relative to all major mailing lists and
vulnerability databases, with the likely exception of data from 2003.
OS VENDOR: this data set identifies CVEs that are associated with
operating system (OS) vendor advisories, which would capture
vulnerabilities in the kernel, as well as applications that are
supported by the OS vendor. The data was limited to CVEs that have
one or more references from the following sources. For open source OS
vendors, the following sources were used: DEBIAN, FREEBSD,
MANDRAKE/MANDRIVA, NETBSD, OPENBSD, REDHAT, and SUSE. The closed
source OS vendors included: AIXAPAR, APPLE, CISCO, HP, MS, MSKB, SCO,
SGI, SUN, and SUNALERT. CVE does not have the internal data fields to
support more fine-grained analysis for major non-OS vendors.
OPEN/CLOSED SOURCE: open and closed source operating system (OS)
vendors were using the same methods and categories as described in the
"OS VENDOR" section. Because some closed source vendors such as Apple
have significant codebase overlap with open source products, any
overlapping CVEs were removed from the data set. Both open and closed
sets had at least 1700 vulnerabilities.
In each data set, vulnerabilities were not removed if they were marked
as "disputed." Many disputes are incorrect or unresolved.
=================================
===== Trend Table Color Key =====
=================================
In the HTML pages, the following color key is used for trend tables.
GRAY: used in comparisons to help visually separate one data set from
another
RED: a top 10 for that year
GREEN: during that year, the vulnerability's rank was at least 5
points BELOW the average rank for that vulnerability
YELLOW: during that year, the vulnerability's rank was at least 5
points ABOVE the average rank for that vulnerability
So, green on the left indicates vulns with RISING popularity, as will
yellow on the right. Green on the right indicates vulns with FALLING
popularity, as will yellow on the left.
============================================
===== Table 1 Analysis: Overall Trends =====
============================================
The most notable trend is the sharp rise in public reports for
vulnerabilities that are specific to web applications.
Buffer overflows were number 1 year after year, but that changed in
2005 with the rise of web application vulnerabilities, including
cross-site scripting (XSS), SQL injection, and remote file inclusion,
although SQL injection is not limited just to web applications. In
fact, so far in 2006, buffer overflows are only #4.
There are probably several contributing factors to this increase in
web vulnerabilities:
1) The most basic data manipulations for these vulnerabilities are
very simple to perform, e.g., "'" for SQL injection and
"<script>alert('hi')</script>" for XSS. This makes it easy for
beginning researchers to quickly test large amounts of software.
2) There is a plethora of freely available web applications. Much of
the code is alpha or beta, written by inexperienced programmers
with easy-to-learn languages such as PHP, and distributed on
high-traffic sites. The applications might have a small or
non-existent user base. Such software is often rife with
easy-to-find vulnerabilities, and it is often a target for
beginning researchers. The large number of these
"fish-in-a-barrel" applications is probably a major contributor to
the overall trends.
3) With XSS, every input has the potential to be an attack vector,
which does not occur with other vulnerability types. This leaves
more opportunity for a single mistake to occur in a program that
otherwise protects against XSS. SQL injection also has many
potential attack vectors.
4) Despite popular opinion that XSS is easily prevented, it has many
subtleties and variants. Even solid applications can have flaws in
them; consider non-standard browser behaviors that try to "fix"
malformed HTML, which might slip by a filter that uses regular
expressions. Finally, until early 2006, the PHP interpreter had a
vulnerability in which it did not quote error messages, but many
researchers only reported the surface-level "resultant" XSS instead
of figuring out whether there was a different "primary"
vulnerability that led to the error.
5) There is some evidence that over the past couple of years, web
defacers have taken an interest in performing and publishing their
own research. This is probably due to the ease of finding
vulnerabilities, combined with the presence of high-risk problems
such as PHP file inclusion, which can be used to remotely install
powerful, easily-available backdoor code. Based on customer posts
to numerous vendor forums, there is solid evidence that remote file
inclusion is regularly used to compromise web servers, which also
helps to explain its popularity.
Overall Trends: Other Interesting Results
-----------------------------------------
1) For 2006, the top 5 vulnerability types are responsible for 57% of
all CVEs. With over 35 vulnerability types used in this report,
and dozens more as currently identified in CWE, this shows how most
public reports concentrate only on a handful of vulnerability
types.
2) PHP remote file inclusion (php-include) has been steadily gaining
ground since 2001, enough so that it is number 3 at this point in
2006. See items (2) and (5) from the previous section for a
possible explanation.
3) Over the years, there has been a noticeable decline in shell
metacharacters, symbolic link following, and directory traversal.
It is unclear whether software is actually improving with respect
to these problems, or if they are not investigated as frequently.
4) Information leaks (infoleak) appear regularly. There are 2 main
reasons for the prominence: "information leak" is a more general
class than others (see CWE for more precise sub-categories), and
when an error message includes a full path, that is usually
categorized as an information leak, although it might be resultant
from a separate primary vulnerability.
5) The inability to handle malformed inputs (dos-malform), which
usually leads to a crash or hang, is also a general class.
Malformed-input vulnerabilities have not been studied as closely as
injection vulnerabilities, at least with respect to identifying the
root cause of the problem. Also, many reports do not specify how
an input is malformed. There are likely many cases in which a
researcher accidentally triggers a more serious vulnerability but
does not perform sufficient diagnosis to determine the primary
issue. Finally, vendor reports might only identify an issue as
being related to "malformed input," which obscures the primary
cause.
6) As the percentage of buffer overflows has declined, there has been
an increase in related vulnerability types, including integer
overflows (int-overflow), signedness errors, and double frees
(double-free). These are still very low-percentage, probably due
to their relative newness and difficulty of detection compared to
classic overflows. In addition, these newly emerging vulnerability
types might be labeled as buffer overflows, since they often lead
to buffer overflows, and the "buffer overflow" term is used
interchangeably for attack, cause, and effect.
7) Other interesting web application vulnerabilities are webroot
(storage of sensitive files under the web document root),
form-field (web parameter tampering), upload of files with
executable extensions (e.g., file.php.gif), eval injection, and
Cross-Site Request Forgery (CSRF).
==================================================
===== Table 2 and 3 Analysis: OS vs. non-OS ======
==================================================
Given the increase in web application vulnerabilities and the
likelihood that it is partially due to researcher interest in software
with small user bases, an analysis was performed based solely on
advisories from operating system (OS) vendors. These advisories
frequently include the OS kernel and key applications that are
supported by the vendor. See the Data Sets section for more
information. Unfortunately, more precise data sets could not be
generated.
Table 2 provides the data for OS vendor advisories alone. Table 3
contrasts the OS vendor advisories with all other reported issues.
There are several notable results:
1) Integer overflows are heavily represented in OS vendor advisories,
rising to number 2 so far in 2006, even though they represent a
small percentage of vulnerabilities overall. This probably
reflects growing interest by expert researchers in finding integer
overflows, along with the tendency of expert researchers to
evaluate widely deployed software. The affected software ranges
widely, including the kernel, cryptographic modules, and multimedia
file processors such as image viewers and music players. After
2004, many of the reported issues occur in libraries or common
DLLs.
2) Buffer overflows are still #1. This is probably due to
under-representation of web applications in OS advisories, relative
to other CVEs. In addition, as related issues like integer
overflows increase, they might be detected or reported as buffer
overflows, since buffer overflows are frequently resultant from
integer overflows.
3) XSS is still very common, even in OS advisories, and it appears
with the same frequency as integer overflows in 2006. An informal
analysis shows that the affected software includes web servers, web
browsers, email clients, administrative interfaces, and Wiki/CMS.
4) With the exception of XSS, there is a wide gulf between web-related
vulnerabilities in OS advisories and other issues. SQL injection
is not even in the top 10 for OS advisories, and PHP remote file
inclusion is practially nonexistent. Many other web-related
vulnerabilities occupy the bottom of the chart. For SQL injection,
it is possible that most OS-supported applications do not use
databases, or aren't web accessible. SQL injection vulnerabilities
are not web-specific, but it seems that they are rarely reported
for non-web applications, so it is possible that this reflects some
researcher bias.
5) Directory traversal and format string vulnerabilities are
frequently reported at a higher rate in OS vendor advisories than
elsewhere. The reason is unclear, because these vulnerabilities
are not restricted to local attack vectors, so one might expect
that they would also appear regularly in web applications.
However, it is likely that researchers do not focus on format
strings because they are rarely exploitable for code execution in
languages other than C. In the case of PHP, many PHP functions are
subject to both remote file inclusion and directory traversal, and
it might be that only the file inclusion is publicly reported. (In
fact, the overlap is so close that this sometimes causes
difficulties with classification).
6) In 2006 so far, more than a quarter (27%) of the OS vendor
advisories did not have sufficient details to actually classify the
vulnerability (type "unk"). This is in sharp contrast to the
non-OS issues, which comprise less than 8%. However, because of
the data sets in question, the non-OS CVEs will include many
non-coordinated disclosures that would, by their nature, require
more details. The next table will demonstrate that it is not just
closed source vendor advisories that omit sufficient details for
vulnerability classification.
7) The "top 5" and "top 10" vulnerabilities in each year are a much
smaller percentage of total vulnerabilities in OS vendor advisories
than non-OS issues. For example, in 2005, the top 5 totaled 29.4%
for OS issues, but 55% for non-OS. For OS issues, this suggests an
increasing diversity in the kinds of vulnerabilities being
reported, whereas for other issues, that diversity appears to be
decreasing. However, this could be another reflection of the
domination of web application vulnerabilities.
====================================================
===== Table 4 Analysis: Open and Closed Source =====
====================================================
Table 4 compares the vulnerability type distribution between the open
source and closed source operating system (OS) vendors. See the "Data
Sets" section for more information on how the data sets were
generated. As a reminder, CVEs that overlapped both open and closed
source sets were omitted.
IMPORTANT: it is inappropriate to use these results to compare the
relative security of open and closed source products, so the report
excludes raw numbers. Both sets had at least 1700 vulnerabilities.
There are too many variations in vendor advisory release policies,
possible differences in research techniques, and other factors cited
in [2]. And, simply put, there is too much potential for raw numbers
to be misused and misinterpreted.
However, some results pose interesting questions that merit more
in-depth investigation. These discrepancies might reflect differences
in vulnerability research techniques, researcher sub-communities,
vendor disclosure policies, and development practices and APIs, but
this has not been proven.
The research and vendor communities are encouraged to investigate the
underlying causes for these differences, which could provide lessons
learned for all software developers, open and closed source alike.
Some of the most notable results are:
1) The percentage of "unknown" vulnerabilities - those that could not
be classified due to lack of details - is significantly higher in
closed source than open source advisories, and 45% so far for 2006.
With such a wide discrepancy, it is difficult to know whether any
of the remaining results in this section are significant. It
should be noted that 10% of issues in open source advisories do not
have enough details to classify the problem.
2) Buffer overflows are number 1 for both open and closed, with
roughly the same percentage over the years.
3) Symbolic link vulnerabilities appear at a higher rate in open
source than closed source, although this might be due to the
non-Unix OSes in the data set. While Windows has "shortcuts"
(.LNK) that are similar to Unix links, they appear very rarely in
Microsoft advisories, or for Windows-based applications. It is not
clear whether this is due to under-research or API/development
differences. The author recalls that at least one Linux researcher
appeared to concentrate on symbolic link issues in 2004 and 2005,
so researcher bias might also be a factor.
4) Malformed-input vulnerabilities appear more frequently in closed
source advisories than open source. This might be due to a lack of
details in closed source advisories. If an advisory mentions a
problem due to "malformed data," it might be assigned the
dos-malform type. Another factor might be due to black box
techniques. It seems likely that fuzzers and other tools would be
used more frequently against closed source products than open
source, but this is not known.
5) XSS vulnerabilities appear more frequently in open source
advisories than closed, but this might be a reflection of vendor
release policies for advisories. It seems that open source vendors
are more likely to release advisories for smaller packages.
6) Format string vulnerabilities appear more frequently in open
source. There are probably several factors. First, susceptible
API library calls such as printf() are easily found in source code
using crude methods, whereas binary reverse engineering techniques
are not conducted by many researchers (this might also be an
explanation for symbolic link issues). Second, many format string
problems seem to occur in rarely-triggered error conditions, which
makes them more difficult to test with black box methods.
Perhaps most surprising: it appears that, since 2003, the non-Unix
closed source advisories have not mentioned any format strings. It
is not clear why there would be such a radical difference, although
it could be due to the lack of details in those advisories.
7) Integer overflows have been roughly the same rank for open and
closed source. This is a curious similarity, since one might not
expect open and closed source analysis techniques to be equally
capable in finding these problems.
8) Another interesting example is in the use of default passwords.
Over the years, very few open source vendor advisories have
mentioned default passwords, whereas they appear with some
regularity in closed source advisories. It is not clear whether
this is a difference in shipping/configuration practices or vendor
disclosure policies.
9) Shell metacharacter issues appear less frequently in non-Unix
closed source than other closed source advisories. This result was
found by a separate analysis; it is not evident in Table 4. This
could be due to usage patterns of API functions such as
CreateProcess() for Windows, and system() for Unix. This result is
being reported because it is the most concrete example of how API
functions might play a role in implementation-level
vulnerabilities.
================================
===== Possible Future Work =====
================================
1) The vulnerability types could be tied to other CVE-normalized data,
such as IDS, incident databases, or vulnerability scanning results.
This could determine the types of vulnerabilities that are being
actively exploited or detected in real-world enterprises.
2) More precise classification could be informative. Approximately
30% of CVEs have vulnerability types that cannot be described using
the current classification scheme. Another 15% are "unknown"
vulnerabilities whose disclosures do not have sufficient details to
determine any vulnerability type, but this problem is unavoidable,
since some vendors do not release these details.
3) A crude measure of researcher diversity might be possible by
linking data to other vulnerability databases that record this
information. This could be used to determine if the raw number of
researchers is increasing (probably), how that rate is increasing
relative to the number of vulnerabilities (unknown), and how many
different bug types are found by the average researcher (probably
fairly small). If such data is available, then a further breakdown
could be performed based on professional researchers versus others.
4) More precise data sets could be identified, such as a cross-section
of market leaders in various product categories, not just OS vendor
advisories. CVE does not record this type of information.
===================================
===== Notes on Potential Bias =====
===================================
The diversity of both researchers and vendor disclosure practices
introduces several unmeasurable biases, as described in more detail in
[2].
In the overall results, 2003's issues have 20% with vulnerabilities
that are "not specified" by the CVE analyst, which is inconsistent
with statistics from other years. Many of these vulnerabilities were
reviewed after this discovery, and they are in fact of type "other."
This discrepancy has not been sufficiently explained, although it is
probably at least partially due to the relative percentage of CVEs in
OS vendor advisories to other CVEs, since 2003 was a low-output year
for CVE and thus the concentration was in high-priority software.
Some vulnerability types are probably under-represented due to
classification difficulty. For example, the "form-field" type (web
parameter tampering) might occasionally get classified as an
authentication error, depending on how the original researcher reports
the issue.
==========================================
===== (In)Frequently Asked Questions =====
==========================================
1) Why aren't you giving out raw numbers for open vs. closed source?
Answer: we already said why. See paragraph 2 of the Table 4
analysis for a reminder.
2) Why are you releasing this report now, with incomplete 2006 data?
Answer: when MITRE mentioned the preliminary results at the Cyber
Security Executive Summit on September 13, there was a lot more
interest than we had originally anticipated. Subsequent discussion
of the results might help us to provide a better report when 2006
is done.
3) How does this compare with the other summaries you've posted in the
past? Why have the numbers and percentages changed for older
years?
Answer: (1) we occasionally add CVEs for older issues, (2) some of
the previously released summaries were cumulative instead of
offering a year-by-year breakdown, and (3) eventually, as a new
type of vulnerability is reported more frequently, the CVE project
notices it enough to give it a name, or at least a type. Once we
do that, we can go back and update the older CVEs that also had the
issue. However, we often rely on keyword searches in CVE
descriptions for doing these kinds of updates. The earliest
reports of new vulnerability types probably don't get captured
fully, because CVE descriptions frequently vary in the early days
or months of a new vulnerability type. Most updates to these
vulnerability trends trigger an informal review of the "other"
vulnerabilities for the data set in order to update the type
fields.
4) There are a lot more vulnerability types than what you've covered.
Answer: That's an observation, not a question. If a certain
vulnerability type is not on the list, then it probably didn't
appear frequently enough for the CVE project to track closely.
There are several reasons: (1) the vulnerability type is selected
from a large dropdown menu during CVE refinement, but also (2) our
work in the Common Weakness Enumeration (CWE) is producing hundreds
of vuln types, and we want that to become a little more stable
before doing the next round of modifications to CVE data. Finally,
(3) with approximately 3,500 vulnerabilities marked "other" or "not
specified", it is cost-prohibitive to review each CVE when the set
of categories is updated.
5) Why isn't my favorite web vulnerability here?
Answer: Many web vulnerabilities are difficult to classify because
they are "multi-factor," i.e., they are composed of multiple bugs,
weaknesses, and/or design limitations. Other web issues are really
just specialized attacks that use other primary vulnerabilities.
For example, most HTTP response splitting problems rely on CRLF
injection, so they are classified under CRLF injection.
===================
===== Credits =====
===================
Large-scale trend analyses like this are not possible without the body
of knowledge that has been formed by hundreds or thousands of
researchers, from hobbyists to professionals.
Thanks to the following for substantive feedback on the initial draft,
sometimes in the form of a question that required more investigation:
Bill Heinbockel, Chris Wysopal, and Mark Curphey.
======================
===== References =====
======================
[1] CWE, http://cwe.mitre.org
[2] "Open Letter on the Interpretation of 'Vulnerability Statistics'"
Bugtraq, Full-Disclosure
January 5, 2006
http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041028.html
============================
===== Flaw Terminology =====
============================
Type: auth
CWE: CWE-289, CWE-288, CWE-302, CWE-305, CWE-294, CWE-290, CWE-287, CWE-303
Description:
Weak/bad authentication problem
Type: buf
CWE: CWE-119, CWE-120, others
Description:
Buffer overflow
Type: CF
CWE: none
Description:
General configuration problem, not perm or default
Type: crlf
CWE: CWE-93
Description:
CRLF injection
Type: crypt
CWE: CWE-310, CWE-311, CWE-347, CWE-320, CWE-325
Description:
Cryptographic error (poor design or implementation), including
plaintext storage/transmission of sensitive information.
Type: CSRF
CWE: CWE-352
Description:
Cross-Site Request Forgery (CSRF)
Type: default
CWE: N/A
Description:
Insecure default configuration, e.g., passwords or permissions
Type: design
CWE: none
Description:
Design problem, generally in protocols or programming languages.
Since 2005, its use has been limited due to the highly general nature
of this type.
Type: dos-flood
CWE: CWE-400
Description:
DoS caused by flooding with a large number of *legitimately formatted*
requests/etc.; normally DoS is a crash, or spending a lot more time on
a task than it "should"
Type: dos-malform
CWE: CWE-238, CWE-234, CWE-166, CWE-230, many others
Description:
DoS caused by malformed input
Type: dos-release
CWE: CWE-404
Description:
DoS because system does not properly release resources
Type: dot
CWE: CWE-22, CWE-23, CWE-36
Description:
Directory traversal (file access via ".." or variants)
Type: double-free
CWE: CWE-415
Description:
Double-free vulnerability
Type: eval-inject
CWE: CWE-95
Description:
Eval injection
Type: form-field
CWE: CWE-472
Description:
CGI program inherently trusts form field that should not be modified
(i.e., should be stored locally)
Type: format-string
CWE: CWE-134
Description:
Format string vulnerability; user can inject format specifiers during
string processing.
Type: infoleak
CWE: CWE-205, CWE-212, CWE-203, CWE-209, CWE-207, CWE-200, CWE-215, others
Description:
Information leak by a product, which is not the result of another
vulnerability; typically by design or by producing different "answers"
that suggest the state; often related to configuration / permissions
or error reporting/handling.
Type: int-overflow
CWE: CWE-190
Description:
A numeric value can be incremented to the point where it overflows and
begins at the minimum value, with security implications. Overlaps
signedness errors.
Type: link
CWE: CWE-61, CWE-64
Description:
Symbolic link following
Type: memleak
CWE: CWE-401
Description:
Memory leak (doesn't free memory when it should); use this instead of
dos-release
Type: metachar
CWE: CWE-78
Description:
Unescaped shell metacharacters or other unquoted "special" char's;
currently includes SQL injection but not XSS.
Type: msdos-device
CWE: CWE-67
Description:
Problem due to file names with MS-DOS device names.
Type: not-specified
CWE: none
Description:
The CVE analyst has not assigned a flaw type to the issue, typically
similar to "other".
Type: other
CWE: none
Description:
Other vulnerability; issue could not be described with an available
type at the time of analysis.
Type: pass
CWE: CWE-259
Description:
Default or hard-coded password
Type: perm
CWE: CWE-276
Description:
Assigns bad permissions, improperly calculates permissions, or
improperly checks permissions
Type: php-include
CWE: CWE-98
Description:
PHP remote file inclusion
Type: priv
CWE: CWE-266, CWE-274, CWE-272, CWE-250, CWE-264, CWE-265, CWE-268, CWE-270, CWE-271, CWE-269, CWE-267
Description:
Bad privilege assignment, or privileged process/action is
unprotected/unauthenticated.
Type: race
CWE: CWE-362, CWE-366, CWE-364, CWE-367, CWE-421, CWE-368, CWE-363, CWE-370
Description:
General race condition (NOT SYMBOLIC LINK FOLLOWING (link)!)
Type: rand
CWE: CWE-330, CWE-331, CWE-332, CWE-338, CWE-342, CWE-341, CWE-339, others
Description:
Generation of insufficiently random numbers, typically by using easily
guessable sources of "random" data
Type: relpath
CWE: CWE-426, CWE-428, CWE-114
Description:
Untrusted search path vulnerability - Relies on search paths to find
other executable programs or files, opening up to Trojan horse
attacks, e.g., PATH environment variable in Unix.
Type: sandbox
CWE: CWE-265
Description:
Java/etc. sandbox escape - NOT BY DOT-DOT!
Type: signedness
CWE: CWE-195, CWE-196
Description:
Signedness error; a numeric value in one format/representation is
improperly handled when it is used as if it were another
format/representation. Overlaps integer overflows and array index
errors.
Type: spoof
CWE: CWE-290, CWE-350, CWE-347, CWE-345, CWE-247, CWE-292, CWE-291
Description:
Product is vulnerable to spoofing attacks, generally by not properly
verifying authenticity.
Type: sql-inject
CWE: CWE-89
Description:
SQL injection vulnerability
Type: type-check
CWE: unknown
Description:
Product incorrectly identifies the type of an input parameter or file,
then dispatches the wrong "executable" (possibly itself) to process
the input, or otherwise misrepresents the input in a security-critical
way.
Type: unk
CWE: none
Description:
Unknown vulnerability; report is too vague to determine type of issue.
Type: upload
CWE: CWE-434
Description:
Product does not restrict the extensions for files that can be
uploaded to the web server, leading to code execution if executable
extensions are used in filenames, such as .asp, .php, and .shtml.
Type: webroot
CWE: CWE-219, CWE-433
Description:
Storage of sensitive data under web document root with insufficient
access control.
Type: XSS
CWE: CWE-79, CWE-80, CWE-87, CWE-85, CWE-82, CWE-81, CWE-83, CWE-84
Description:
Cross-site scripting (aka XSS)
====================================
===== Table 1: Overall Results =====
====================================
TOTAL 2001 2002 2003 2004 2005 2006
(16192) (1434) (2138) (1173) (2534) (4538) (4375)
---------- ---------- ---------- ---------- ---------- ---------- ----------
[ 1] XSS 13.9% ( 1) 02.2% (11) 08.7% ( 2) 07.5% ( 2) 10.9% ( 2) 16.0% ( 1) 21.5% ( 1)
2247 32 187 88 276 725 939
[ 2] buf 13.3% ( 2) 19.5% ( 1) 20.3% ( 1) 22.5% ( 1) 15.4% ( 1) 09.8% ( 3) 07.9% ( 4)
2156 279 433 264 391 445 344
[ 3] sql-inject 08.7% ( 3) 00.4% (27) 01.8% (12) 03.0% ( 4) 05.5% ( 3) 12.9% ( 2) 14.0% ( 2)
1416 6 38 35 140 584 613
[ 4] dot 04.7% ( 4) 08.9% ( 2) 05.1% ( 3) 02.9% ( 5) 04.1% ( 4) 04.3% ( 4) 04.4% ( 5)
764 127 110 34 104 195 194
[ 5] php-include 03.5% ( 5) 00.1% (31) 00.3% (30) 00.8% (15) 01.4% (10) 02.1% ( 6) 09.5% ( 3)
561 1 6 9 36 95 414
[ 6] infoleak 03.3% ( 6) 02.6% ( 9) 04.2% ( 5) 02.6% ( 7) 03.7% ( 5) 03.9% ( 5) 02.6% ( 6)
540 37 89 30 95 175 114
[ 7] dos-malform 02.9% ( 7) 04.8% ( 3) 05.1% ( 4) 02.5% ( 8) 03.4% ( 6) 01.8% ( 8) 02.0% ( 7)
463 69 110 29 87 82 86
[ 8] link 02.0% ( 8) 04.5% ( 4) 02.1% ( 9) 03.5% ( 3) 02.8% ( 7) 01.9% ( 7) 00.5% (16)
329 64 45 41 72 87 20
[ 9] format-string 01.8% ( 9) 03.2% ( 7) 01.8% (11) 02.7% ( 6) 02.4% ( 8) 01.7% ( 9) 01.0% (10)
296 46 39 32 61 76 42
[10] crypt 01.6% (10) 03.8% ( 6) 02.7% ( 6) 01.5% ( 9) 00.9% (16) 01.5% (10) 00.9% (11)
261 55 58 18 22 68 40
[11] priv 01.4% (11) 02.5% (10) 02.2% ( 8) 01.0% (12) 01.3% (11) 01.5% (11) 00.9% (12)
233 36 46 12 32 67 40
[12] metachar 01.3% (12) 03.8% ( 5) 02.6% ( 7) 00.7% (17) 01.0% (14) 01.3% (12) 00.3% (20)
218 55 56 8 26 59 14
[13] perm 01.3% (13) 02.7% ( 8) 01.8% (10) 01.3% (11) 00.9% (15) 01.1% (13) 01.1% ( 9)
215 39 39 15 24 48 50
[14] int-overflow 01.0% (14) 00.1% (32) 00.4% (22) 01.4% (10) 01.9% ( 9) 00.8% (15) 01.2% ( 8)
160 1 8 16 47 36 52
[15] dos-flood 00.8% (15) 02.0% (12) 01.7% (13) 00.5% (19) 01.2% (12) 00.2% (27) 00.4% (17)
131 29 36 6 31 10 19
[16] pass 00.8% (16) 01.1% (18) 01.3% (14) 00.2% (28) 01.1% (13) 00.8% (14) 00.4% (18)
125 16 27 2 28 36 16
[17] auth 00.8% (17) 01.5% (13) 01.3% (15) 00.5% (20) 00.7% (17) 00.5% (19) 00.7% (14)
124 22 27 6 17 21 31
[18] webroot 00.5% (18) 00.1% (29) 00.2% (32) 00.3% (24) 00.2% (30) 00.7% (16) 00.9% (13)
88 2 5 3 5 33 40
[19] form-field 00.5% (19) 00.7% (24) 00.8% (17) 00.5% (21) 00.2% (27) 00.4% (20) 00.5% (15)
81 10 17 6 6 19 23
[20] relpath 00.4% (20) 00.8% (22) 00.3% (29) 00.9% (14) 00.6% (18) 00.3% (22) 00.3% (21)
71 12 6 10 14 15 14
[21] race 00.4% (21) 00.5% (26) 00.4% (24) 00.6% (18) 00.4% (21) 00.6% (17) 00.3% (24)
69 7 8 7 10 26 11
[22] memleak 00.4% (22) 01.1% (17) 00.2% (31) 00.4% (22) 00.5% (19) 00.3% (23) 00.2% (27)
61 16 5 5 13 15 7
[23] msdos-device 00.4% (23) 01.0% (20) 00.6% (19) 00.9% (13) 00.2% (23) 00.2% (28) 00.0% (32)
57 15 13 11 6 10 2
[24] crlf 00.3% (24) 00.0% N/A 00.2% (33) 00.1% (30) 00.5% (20) 00.4% (21) 00.3% (19)
49 0 4 1 13 17 14
[25] default 00.3% (26) 01.1% (16) 00.7% (18) 00.1% (33) 00.2% (26) 00.1% (33) 00.1% (29)
48 16 16 1 6 3 6
[26] spoof 00.3% (25) 01.0% (19) 00.3% (28) 00.1% (32) 00.1% (33) 00.2% (26) 00.3% (25)
48 15 7 1 3 11 11
[27] sandbox 00.3% (27) 01.2% (15) 01.0% (16) 00.0% N/A 00.2% (29) 00.0% (34) 00.0% N/A
46 17 22 0 5 2 0
[28] rand 00.3% (28) 01.2% (14) 00.6% (20) 00.3% (25) 00.2% (32) 00.0% (35) 00.2% (26)
45 17 12 3 4 2 7
[29] upload 00.3% (29) 00.0% N/A 00.0% (36) 00.1% (29) 00.2% (24) 00.5% (18) 00.3% (22)
43 0 1 1 6 22 13
[30] signedness 00.2% (30) 00.1% (30) 00.4% (23) 00.8% (16) 00.2% (25) 00.3% (24) 00.0% (34)
38 1 8 9 6 12 2
[31] dos-release 00.2% (31) 00.9% (21) 00.5% (21) 00.2% (27) 00.2% (31) 00.0% N/A 00.0% N/A
30 13 10 2 5 0 0
[32] CF 00.2% (32) 00.7% (23) 00.3% (27) 00.2% (26) 00.0% N/A 00.1% (31) 00.1% (28)
29 10 7 2 0 4 6
[33] eval-inject 00.2% (33) 00.0% N/A 00.0% N/A 00.0% N/A 00.0% (34) 00.2% (25) 00.3% (23)
25 0 0 0 1 11 13
[34] design 00.1% (34) 00.6% (25) 00.4% (26) 00.1% (31) 00.0% (35) 00.1% (32) 00.0% (31)
23 8 8 1 1 3 2
[35] double-free 00.1% (35) 00.0% N/A 00.1% (34) 00.3% (23) 00.2% (22) 00.1% (30) 00.1% (30)
21 0 2 4 6 5 4
[36] CSRF 00.1% (37) 00.0% N/A 00.0% (35) 00.0% N/A 00.2% (28) 00.2% (29) 00.0% (33)
16 0 1 0 5 8 2
[37] type-check 00.1% (36) 00.4% (28) 00.4% (25) 00.0% N/A 00.0% N/A 00.0% (36) 00.0% (35)
16 6 8 0 0 1 1
-------------------------
UNKNOWN/UNSPECIFIED ITEMS
-------------------------
n/a unk 09.0% N/A 07.9% N/A 07.1% N/A 07.0% N/A 08.2% N/A 08.9% N/A 11.5% N/A
1460 114 151 82 209 402 502
n/a other 15.2% N/A 16.7% N/A 19.0% N/A 11.8% N/A 17.2% N/A 13.1% N/A 14.9% N/A
2468 239 407 139 435 595 653
n/a not-specified 06.9% N/A 00.1% N/A 03.1% N/A 20.5% N/A 11.3% N/A 11.3% N/A 00.3% N/A
1121 2 66 240 286 513 14
===============================
===== Table 2: OS Vendors =====
===============================
TOTAL 2001 2002 2003 2004 2005 2006
(4418) ( 443) ( 660) ( 527) ( 736) (1199) ( 853)
---------- ---------- ---------- ---------- ---------- ---------- ----------
[ 1] buf 20.0% ( 1) 21.0% ( 1) 26.8% ( 1) 24.9% ( 1) 20.4% ( 1) 16.2% ( 1) 16.1% ( 1)
882 93 177 131 150 194 137
[ 2] link 04.0% ( 2) 07.4% ( 2) 03.3% ( 4) 04.0% ( 2) 05.2% ( 2) 04.0% ( 3) 01.8% ( 5)
177 33 22 21 38 48 15
[ 3] dos-malform 03.7% ( 3) 05.6% ( 3) 06.1% ( 2) 02.7% ( 4) 04.5% ( 4) 01.8% ( 7) 03.3% ( 4)
162 25 40 14 33 22 28
[ 4] XSS 03.4% ( 4) 01.6% (12) 04.4% ( 3) 03.0% ( 3) 01.4% ( 7) 04.2% ( 2) 04.7% ( 3)
152 7 29 16 10 50 40
[ 5] int-overflow 02.7% ( 5) 00.0% N/A 01.2% (12) 02.3% ( 6) 04.6% ( 3) 02.1% ( 6) 04.7% ( 2)
119 0 8 12 34 25 40
[ 6] format-string 02.4% ( 6) 05.2% ( 4) 01.5% (10) 02.3% ( 5) 02.6% ( 5) 02.4% ( 5) 01.6% ( 7)
107 23 10 12 19 29 14
[ 7] priv 02.0% ( 7) 04.1% ( 5) 02.3% ( 6) 00.8% (13) 00.8% (14) 02.6% ( 4) 01.6% ( 6)
88 18 15 4 6 31 14
[ 8] perm 01.8% ( 8) 04.1% ( 6) 02.1% ( 7) 01.1% (11) 01.1% (10) 01.7% ( 8) 01.4% ( 9)
78 18 14 6 8 20 12
[ 9] dot 01.4% ( 9) 01.6% (13) 01.5% ( 9) 01.1% ( 8) 01.6% ( 6) 01.3% (12) 01.6% ( 8)
64 7 10 6 12 15 14
[10] metachar 01.2% (10) 02.0% ( 9) 02.6% ( 5) 00.8% (16) 00.7% (17) 01.3% (11) 00.4% (19)
53 9 17 4 5 15 3
[11] infoleak 01.2% (11) 00.9% (20) 01.2% (13) 01.1% ( 9) 01.1% ( 9) 01.3% (10) 01.2% (10)
52 4 8 6 8 16 10
[12] race 01.0% (12) 01.1% (17) 00.9% (15) 00.4% (19) 01.0% (11) 01.6% ( 9) 00.7% (13)
45 5 6 2 7 19 6
[13] memleak 00.8% (13) 02.0% (10) 00.6% (19) 00.8% (14) 01.0% (12) 00.9% (14) 00.2% (23)
37 9 4 4 7 11 2
[14] sql-inject 00.8% (14) 00.2% (27) 00.6% (21) 01.1% (10) 00.7% (16) 00.9% (13) 00.9% (11)
35 1 4 6 5 11 8
[15] crypt 00.8% (15) 01.6% (14) 01.4% (11) 01.1% ( 7) 00.4% (18) 00.4% (18) 00.5% (16)
34 7 9 6 3 5 4
[16] sandbox 00.7% (16) 02.7% ( 7) 02.1% ( 8) 00.0% N/A 00.1% (23) 00.2% (28) 00.0% N/A
29 12 14 0 1 2 0
[17] relpath 00.6% (18) 01.6% (11) 00.3% (28) 00.4% (18) 01.1% ( 8) 00.3% (27) 00.7% (14)
28 7 2 2 8 3 6
[18] dos-flood 00.6% (17) 02.5% ( 8) 00.6% (20) 00.2% (22) 00.3% (20) 00.3% (25) 00.8% (12)
28 11 4 1 2 3 7
[19] auth 00.5% (20) 01.4% (15) 01.1% (14) 00.6% (17) 00.3% (21) 00.3% (21) 00.2% (24)
24 6 7 3 2 4 2
[20] signedness 00.5% (19) 00.2% (24) 00.9% (16) 00.9% (12) 00.4% (19) 00.6% (15) 00.2% (25)
24 1 6 5 3 7 2
[21] pass 00.5% (21) 00.2% (25) 00.8% (17) 00.2% (20) 00.8% (15) 00.3% (24) 00.5% (15)
21 1 5 1 6 4 4
[22] double-free 00.4% (22) 00.0% N/A 00.3% (29) 00.8% (15) 00.8% (13) 00.3% (20) 00.4% (18)
19 0 2 4 6 4 3
[23] rand 00.3% (23) 01.4% (16) 00.5% (22) 00.2% (27) 00.1% (24) 00.0% N/A 00.2% (27)
13 6 3 1 1 0 2
[24] crlf 00.2% (25) 00.0% N/A 00.5% (23) 00.2% (25) 00.0% N/A 00.4% (17) 00.2% (20)
11 0 3 1 0 5 2
[25] spoof 00.2% (24) 00.2% (26) 00.3% (26) 00.0% N/A 00.0% N/A 00.3% (23) 00.5% (17)
11 1 2 0 0 4 4
[26] form-field 00.2% (26) 00.5% (22) 00.3% (27) 00.2% (21) 00.0% N/A 00.4% (16) 00.0% N/A
10 2 2 1 0 5 0
[27] default 00.2% (27) 00.2% (28) 00.5% (24) 00.0% N/A 00.1% (22) 00.3% (26) 00.2% (21)
10 1 3 0 1 3 2
[28] type-check 00.2% (28) 00.7% (21) 00.6% (18) 00.0% N/A 00.0% N/A 00.1% (30) 00.0% N/A
8 3 4 0 0 1 0
[29] CF 00.2% (29) 00.9% (18) 00.2% (31) 00.2% (26) 00.0% N/A 00.0% N/A 00.1% (29)
7 4 1 1 0 0 1
[30] dos-release 00.2% (30) 00.9% (19) 00.3% (25) 00.2% (23) 00.0% N/A 00.0% N/A 00.0% N/A
7 4 2 1 0 0 0
[31] php-include 00.1% (31) 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.3% (19) 00.2% (26)
6 0 0 0 0 4 2
[32] eval-inject 00.1% (32) 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.3% (22) 00.2% (22)
6 0 0 0 0 4 2
[33] design 00.1% (33) 00.2% (23) 00.3% (30) 00.2% (24) 00.0% N/A 00.1% (31) 00.0% N/A
5 1 2 1 0 1 0
[34] webroot 00.0% (35) 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.1% (28)
1 0 0 0 0 0 1
[35] upload 00.0% (36) 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.1% (32) 00.0% N/A
1 0 0 0 0 1 0
[36] CSRF 00.0% (34) 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.1% (29) 00.0% N/A
1 0 0 0 0 1 0
-------------------------
UNKNOWN/UNSPECIFIED ITEMS
-------------------------
n/a unk 16.0% N/A 12.4% N/A 12.6% N/A 10.4% N/A 12.2% N/A 16.1% N/A 27.2% N/A
708 55 83 55 90 193 232
n/a other 16.4% N/A 15.3% N/A 15.6% N/A 12.0% N/A 12.2% N/A 14.4% N/A 26.6% N/A
724 68 103 63 90 173 227
n/a not-specified 14.3% N/A 00.2% N/A 05.9% N/A 26.0% N/A 24.6% N/A 22.2% N/A 00.8% N/A
631 1 39 137 181 266 7
==========================================
===== Table 3: OS Vendors vs. Others =====
==========================================
TOTAL 2001 2002 2003 2004 2005 2006
---------- ---------- ---------- ---------- ---------- ---------- ----------
OS-ven 4418 443 660 527 736 1199 853
Other 11774 991 1478 646 1798 3339 3522
---------- ---------- ---------- ---------- ---------- ---------- ----------
[ 1] XSS 03.4% ( 4) 01.6% (13) 04.4% ( 3) 03.0% ( 3) 01.4% ( 7) 04.2% ( 2) 04.7% ( 2)
152 7 29 16 10 50 40
**** 17.8% ( 1) 02.5% ( 8) 10.7% ( 2) 11.1% ( 2) 14.8% ( 1) 20.2% ( 1) 25.5% ( 1)
2095 25 158 72 266 675 899
[ 2] buf 20.0% ( 1) 21.0% ( 1) 26.8% ( 1) 24.9% ( 1) 20.4% ( 1) 16.2% ( 1) 16.1% ( 1)
882 93 177 131 150 194 137
**** 10.8% ( 3) 18.8% ( 1) 17.3% ( 1) 20.6% ( 1) 13.4% ( 2) 07.5% ( 3) 05.9% ( 4)
1274 186 256 133 241 251 207
[ 3] sql-inject 00.8% (14) 00.2% (27) 00.6% (19) 01.1% ( 8) 00.7% (16) 00.9% (13) 00.9% (11)
35 1 4 6 5 11 8
**** 11.7% ( 2) 00.5% (26) 02.3% ( 8) 04.5% ( 3) 07.5% ( 3) 17.2% ( 2) 17.2% ( 2)
1381 5 34 29 135 573 605
[ 4] dot 01.4% ( 9) 01.6% (14) 01.5% ( 9) 01.1% (10) 01.6% ( 6) 01.3% (11) 01.6% ( 8)
64 7 10 6 12 15 14
**** 05.9% ( 4) 12.1% ( 2) 06.8% ( 3) 04.3% ( 4) 05.1% ( 4) 05.4% ( 4) 05.1% ( 5)
700 120 100 28 92 180 180
[ 5] php-include 00.1% (32) 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.3% (19) 00.2% (27)
6 0 0 0 0 4 2
**** 04.7% ( 5) 00.1% (30) 00.4% (22) 01.4% (11) 02.0% ( 8) 02.7% ( 6) 11.7% ( 3)
555 1 6 9 36 91 412
[ 6] infoleak 01.2% (11) 00.9% (20) 01.2% (13) 01.1% (11) 01.1% ( 9) 01.3% (10) 01.2% (10)
52 4 8 6 8 16 10
**** 04.1% ( 6) 03.3% ( 6) 05.5% ( 4) 03.7% ( 5) 04.8% ( 5) 04.8% ( 5) 03.0% ( 6)
488 33 81 24 87 159 104
[ 7] dos-malform 03.7% ( 3) 05.6% ( 3) 06.1% ( 2) 02.7% ( 4) 04.5% ( 4) 01.8% ( 7) 03.3% ( 4)
162 25 40 14 33 22 28
**** 02.6% ( 7) 04.4% ( 5) 04.7% ( 5) 02.3% ( 8) 03.0% ( 6) 01.8% ( 8) 01.6% ( 7)
301 44 70 15 54 60 58
[ 8] link 04.0% ( 2) 07.4% ( 2) 03.3% ( 4) 04.0% ( 2) 05.2% ( 2) 04.0% ( 3) 01.8% ( 5)
177 33 22 21 38 48 15
**** 01.3% (11) 03.1% ( 7) 01.6% (13) 03.1% ( 7) 01.9% ( 9) 01.2% (11) 00.1% (25)
152 31 23 20 34 39 5
[ 9] format-string 02.4% ( 6) 05.2% ( 4) 01.5% (10) 02.3% ( 6) 02.6% ( 5) 02.4% ( 5) 01.6% ( 6)
107 23 10 12 19 29 14
**** 01.6% ( 9) 02.3% ( 9) 02.0% (11) 03.1% ( 6) 02.3% ( 7) 01.4% ( 9) 00.8% (12)
189 23 29 20 42 47 28
[10] crypt 00.8% (15) 01.6% (12) 01.4% (11) 01.1% ( 9) 00.4% (19) 00.4% (16) 00.5% (15)
34 7 9 6 3 5 4
**** 01.9% ( 8) 04.8% ( 3) 03.3% ( 6) 01.9% ( 9) 01.1% (14) 01.9% ( 7) 01.0% (10)
227 48 49 12 19 63 36
[11] priv 02.0% ( 7) 04.1% ( 5) 02.3% ( 6) 00.8% (16) 00.8% (13) 02.6% ( 4) 01.6% ( 7)
88 18 15 4 6 31 14
**** 01.2% (12) 01.8% (12) 02.1% (10) 01.2% (14) 01.4% (11) 01.1% (12) 00.7% (13)
145 18 31 8 26 36 26
[12] metachar 01.2% (10) 02.0% (10) 02.6% ( 5) 00.8% (15) 00.7% (17) 01.3% (12) 00.4% (19)
53 9 17 4 5 15 3
**** 01.4% (10) 04.6% ( 4) 02.6% ( 7) 00.6% (20) 01.2% (13) 01.3% (10) 00.3% (21)
165 46 39 4 21 44 11
[13] perm 01.8% ( 8) 04.1% ( 6) 02.1% ( 7) 01.1% ( 7) 01.1% (10) 01.7% ( 8) 01.4% ( 9)
78 18 14 6 8 20 12
**** 01.2% (13) 02.1% (10) 01.7% (12) 01.4% (12) 00.9% (15) 00.8% (15) 01.1% ( 9)
137 21 25 9 16 28 38
[14] int-overflow 02.7% ( 5) 00.0% N/A 01.2% (12) 02.3% ( 5) 04.6% ( 3) 02.1% ( 6) 04.7% ( 3)
119 0 8 12 34 25 40
**** 00.3% (22) 00.1% (31) 00.0% N/A 00.6% (18) 00.7% (17) 00.3% (21) 00.3% (17)
41 1 0 4 13 11 12
[15] dos-flood 00.6% (18) 02.5% ( 8) 00.6% (18) 00.2% (27) 00.3% (21) 00.3% (26) 00.8% (12)
28 11 4 1 2 3 7
**** 00.9% (15) 01.8% (11) 02.2% ( 9) 00.8% (17) 01.6% (10) 00.2% (23) 00.3% (18)
103 18 32 5 29 7 12
[16] pass 00.5% (21) 00.2% (25) 00.8% (17) 00.2% (26) 00.8% (15) 00.3% (20) 00.5% (17)
21 1 5 1 6 4 4
**** 00.9% (14) 01.5% (16) 01.5% (14) 00.2% (27) 01.2% (12) 01.0% (14) 00.3% (16)
104 15 22 1 22 32 12
[17] auth 00.5% (20) 01.4% (15) 01.1% (14) 00.6% (17) 00.3% (20) 00.3% (23) 00.2% (23)
24 6 7 3 2 4 2
**** 00.8% (16) 01.6% (13) 01.4% (15) 00.5% (22) 00.8% (16) 00.5% (17) 00.8% (11)
100 16 20 3 15 17 29
[18] webroot 00.0% (35) 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.1% (28)
1 0 0 0 0 0 1
**** 00.7% (17) 00.2% (28) 00.3% (26) 00.5% (21) 00.3% (26) 01.0% (13) 01.1% ( 8)
87 2 5 3 5 33 39
[19] form-field 00.2% (27) 00.5% (22) 00.3% (26) 00.2% (21) 00.0% N/A 00.4% (18) 00.0% N/A
10 2 2 1 0 5 0
**** 00.6% (18) 00.8% (20) 01.0% (16) 00.8% (15) 00.3% (23) 00.4% (18) 00.7% (14)
71 8 15 5 6 14 23
[20] relpath 00.6% (17) 01.6% (11) 00.3% (25) 00.4% (19) 01.1% ( 8) 00.3% (27) 00.7% (13)
28 7 2 2 8 3 6
**** 00.4% (20) 00.5% (25) 00.3% (27) 01.2% (13) 00.3% (22) 00.4% (19) 00.2% (22)
43 5 4 8 6 12 8
[21] race 01.0% (12) 01.1% (17) 00.9% (16) 00.4% (18) 01.0% (12) 01.6% ( 9) 00.7% (14)
45 5 6 2 7 19 6
**** 00.2% (27) 00.2% (29) 00.1% (29) 00.8% (16) 00.2% (30) 00.2% (27) 00.1% (24)
24 2 2 5 3 7 5
[22] memleak 00.8% (13) 02.0% ( 9) 00.6% (20) 00.8% (13) 01.0% (11) 00.9% (14) 00.2% (25)
37 9 4 4 7 11 2
**** 00.2% (28) 00.7% (22) 00.1% (33) 00.2% (29) 00.3% (19) 00.1% (30) 00.1% (26)
24 7 1 1 6 4 5
[23] msdos-device 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A
0 0 0 0 0 0 0
**** 00.5% (19) 01.5% (15) 00.9% (17) 01.7% (10) 00.3% (21) 00.3% (22) 00.1% (31)
57 15 13 11 6 10 2
[24] crlf 00.2% (24) 00.0% N/A 00.5% (23) 00.2% (25) 00.0% N/A 00.4% (17) 00.2% (24)
11 0 3 1 0 5 2
**** 00.3% (23) 00.0% N/A 00.1% (34) 00.0% N/A 00.7% (18) 00.4% (20) 00.3% (19)
38 0 1 0 13 12 12
[25] spoof 00.2% (25) 00.2% (28) 00.3% (29) 00.0% N/A 00.0% N/A 00.3% (21) 00.5% (16)
11 1 2 0 0 4 4
**** 00.3% (25) 01.4% (17) 00.3% (25) 00.2% (28) 00.2% (29) 00.2% (25) 00.2% (23)
37 14 5 1 3 7 7
[26] default 00.2% (26) 00.2% (26) 00.5% (24) 00.0% N/A 00.1% (22) 00.3% (25) 00.2% (26)
10 1 3 0 1 3 2
**** 00.3% (24) 01.5% (14) 00.9% (18) 00.2% (26) 00.3% (27) 00.0% N/A 00.1% (29)
38 15 13 1 5 0 4
[27] sandbox 00.7% (16) 02.7% ( 7) 02.1% ( 8) 00.0% N/A 00.1% (24) 00.2% (28) 00.0% N/A
29 12 14 0 1 2 0
**** 00.1% (33) 00.5% (24) 00.5% (20) 00.0% N/A 00.2% (28) 00.0% N/A 00.0% N/A
17 5 8 0 4 0 0
[28] rand 00.3% (23) 01.4% (16) 00.5% (22) 00.2% (23) 00.1% (23) 00.0% N/A 00.2% (22)
13 6 3 1 1 0 2
**** 00.3% (26) 01.1% (18) 00.6% (19) 00.3% (23) 00.2% (32) 00.1% (32) 00.1% (28)
32 11 9 2 3 2 5
[29] upload 00.0% (34) 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.1% (32) 00.0% N/A
1 0 0 0 0 1 0
**** 00.4% (21) 00.0% N/A 00.1% (32) 00.2% (30) 00.3% (20) 00.6% (16) 00.4% (15)
42 0 1 1 6 21 13
[30] signedness 00.5% (19) 00.2% (24) 00.9% (15) 00.9% (12) 00.4% (18) 00.6% (15) 00.2% (20)
24 1 6 5 3 7 2
**** 00.1% (35) 00.0% N/A 00.1% (30) 00.6% (19) 00.2% (31) 00.1% (28) 00.0% N/A
14 0 2 4 3 5 0
[31] dos-release 00.2% (29) 00.9% (19) 00.3% (30) 00.2% (20) 00.0% N/A 00.0% N/A 00.0% N/A
7 4 2 1 0 0 0
**** 00.2% (29) 00.9% (19) 00.5% (21) 00.2% (25) 00.3% (25) 00.0% N/A 00.0% N/A
23 9 8 1 5 0 0
[32] CF 00.2% (30) 00.9% (18) 00.2% (31) 00.2% (24) 00.0% N/A 00.0% N/A 00.1% (29)
7 4 1 1 0 0 1
**** 00.2% (30) 00.6% (23) 00.4% (23) 00.2% (24) 00.0% N/A 00.1% (29) 00.1% (27)
22 6 6 1 0 4 5
[33] eval-inject 00.1% (31) 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.3% (22) 00.2% (21)
6 0 0 0 0 4 2
**** 00.2% (31) 00.0% N/A 00.0% N/A 00.0% N/A 00.1% (34) 00.2% (26) 00.3% (20)
19 0 0 0 1 7 11
[34] design 00.1% (33) 00.2% (23) 00.3% (27) 00.2% (22) 00.0% N/A 00.1% (30) 00.0% N/A
5 1 2 1 0 1 0
**** 00.2% (32) 00.7% (21) 00.4% (24) 00.0% N/A 00.1% (33) 00.1% (31) 00.1% (32)
18 7 6 0 1 2 2
[35] double-free 00.4% (22) 00.0% N/A 00.3% (28) 00.8% (14) 00.8% (14) 00.3% (24) 00.4% (18)
19 0 2 4 6 4 3
**** 00.0% (37) 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.0% (33) 00.0% (33)
2 0 0 0 0 1 1
[36] type-check 00.2% (28) 00.7% (21) 00.6% (21) 00.0% N/A 00.0% N/A 00.1% (31) 00.0% N/A
8 3 4 0 0 1 0
**** 00.1% (36) 00.3% (27) 00.3% (28) 00.0% N/A 00.0% N/A 00.0% N/A 00.0% (34)
8 3 4 0 0 0 1
[37] CSRF 00.0% (36) 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.1% (29) 00.0% N/A
1 0 0 0 0 1 0
**** 00.1% (34) 00.0% N/A 00.1% (31) 00.0% N/A 00.3% (24) 00.2% (24) 00.1% (30)
15 0 1 0 5 7 2
-------------------------
UNKNOWN/UNSPECIFIED ITEMS
-------------------------
n/a unk 16.0% N/A 12.4% N/A 12.6% N/A 10.4% N/A 12.2% N/A 16.1% N/A 27.2% N/A
708 55 83 55 90 193 232
**** 06.4% N/A 06.0% N/A 04.6% N/A 04.2% N/A 06.6% N/A 06.3% N/A 07.7% N/A
752 59 68 27 119 209 270
n/a other 16.4% N/A 15.3% N/A 15.6% N/A 12.0% N/A 12.2% N/A 14.4% N/A 26.6% N/A
724 68 103 63 90 173 227
**** 14.8% N/A 17.3% N/A 20.6% N/A 11.8% N/A 19.2% N/A 12.6% N/A 12.1% N/A
1744 171 304 76 345 422 426
n/a not-specified 14.3% N/A 00.2% N/A 05.9% N/A 26.0% N/A 24.6% N/A 22.2% N/A 00.8% N/A
631 1 39 137 181 266 7
**** 04.2% N/A 00.1% N/A 01.8% N/A 15.9% N/A 05.8% N/A 07.4% N/A 00.2% N/A
490 1 27 103 105 247 7
==================================================
===== Table 4: Open and Closed Source (OS vendors)
==================================================
TOTAL 2001 2002 2003 2004 2005 2006
---------- ---------- ---------- ---------- ---------- ---------- ----------
[ 1] buf 19.7% ( 1) 20.3% ( 1) 24.6% ( 1) 25.0% ( 1) 24.5% ( 1) 14.6% ( 1) 17.1% ( 1)
**** 20.4% ( 1) 20.3% ( 1) 27.7% ( 1) 26.1% ( 1) 15.3% ( 1) 18.5% ( 1) 16.3% ( 1)
[ 2] link 06.4% ( 2) 14.0% ( 2) 04.8% ( 3) 04.9% ( 2) 08.6% ( 2) 06.1% ( 2) 02.4% ( 5)
**** 01.6% ( 6) 01.0% (17) 01.8% ( 9) 03.0% ( 2) 01.9% ( 5) 00.8% ( 7) 01.6% ( 6)
[ 3] dos-malform 02.8% ( 5) 02.7% ( 7) 04.4% ( 4) 02.6% ( 6) 03.5% ( 5) 01.7% ( 8) 03.3% ( 4)
**** 05.3% ( 2) 09.2% ( 2) 08.1% ( 2) 02.5% ( 3) 07.3% ( 2) 02.1% ( 3) 03.9% ( 3)
[ 4] XSS 04.6% ( 3) 02.7% ( 8) 05.9% ( 2) 03.0% ( 5) 01.4% (10) 05.5% ( 3) 07.1% ( 2)
**** 02.3% ( 3) 00.5% (22) 03.6% ( 4) 02.5% ( 4) 00.8% ( 8) 02.1% ( 4) 03.2% ( 4)
[ 5] format-string 04.0% ( 4) 08.6% ( 3) 02.9% ( 6) 03.0% ( 4) 04.9% ( 3) 03.7% ( 4) 02.4% ( 6)
**** 00.8% (16) 01.4% (13) 00.6% (17) 02.0% ( 5) 00.4% (18) 00.8% (10) 00.3% (17)
[ 6] int-overflow 02.6% ( 6) 00.0% N/A 02.2% ( 7) 03.4% ( 3) 04.0% ( 4) 02.2% ( 7) 03.5% ( 3)
**** 01.7% ( 5) 00.0% N/A 00.0% N/A 01.0% ( 7) 03.4% ( 3) 00.8% ( 8) 04.2% ( 2)
[ 7] priv 02.3% ( 7) 05.4% ( 4) 01.8% ( 8) 01.5% (12) 01.2% (11) 02.3% ( 5) 02.2% ( 7)
**** 01.8% ( 4) 01.9% ( 8) 03.0% ( 6) 00.0% N/A 00.4% (16) 03.4% ( 2) 00.8% (13)
[ 8] perm 02.2% ( 8) 05.4% ( 5) 01.1% (13) 01.9% ( 8) 01.7% ( 7) 02.3% ( 6) 01.4% ( 9)
**** 01.6% ( 7) 02.4% ( 6) 03.3% ( 5) 00.5% (11) 00.4% (12) 00.8% (12) 01.8% ( 5)
[ 9] dot 01.5% (10) 00.5% (18) 01.8% ( 9) 01.1% (15) 02.0% ( 6) 01.4% (12) 01.6% ( 8)
**** 01.2% (10) 01.9% (10) 00.9% (13) 01.0% ( 9) 01.5% ( 7) 00.5% (18) 01.6% ( 7)
[10] infoleak 01.1% (13) 00.5% (19) 01.5% (12) 01.1% (13) 01.2% (12) 01.0% (14) 01.4% (10)
**** 01.1% (13) 01.4% (12) 00.9% (12) 01.0% ( 8) 00.4% (17) 01.6% ( 5) 01.1% (10)
[11] metachar 01.5% ( 9) 03.2% ( 6) 02.9% ( 5) 01.5% (11) 00.6% (15) 01.4% (11) 00.5% (15)
**** 00.5% (18) 01.0% (18) 01.2% (11) 00.0% N/A 00.4% (14) 00.5% (15) 00.0% N/A
[12] race 01.4% (11) 02.3% ( 9) 01.8% (10) 00.4% (19) 01.7% ( 8) 01.6% ( 9) 00.8% (13)
**** 00.3% (24) 00.0% N/A 00.0% N/A 00.5% (10) 00.0% N/A 00.8% (14) 00.3% (21)
[13] sql-inject 01.2% (12) 00.5% (21) 00.7% (18) 01.9% ( 9) 00.9% (13) 01.6% (10) 01.4% (11)
**** 00.4% (19) 00.0% N/A 00.6% (18) 00.5% (20) 00.4% (13) 00.0% N/A 00.8% (14)
[14] memleak 00.9% (14) 00.0% N/A 00.7% (16) 01.1% (14) 01.4% ( 9) 01.2% (13) 00.3% (24)
**** 00.9% (15) 04.3% ( 4) 00.3% (19) 00.5% (12) 00.0% N/A 00.8% (13) 00.3% (19)
[15] crypt 00.7% (16) 01.8% (11) 00.7% (15) 01.9% ( 7) 00.0% N/A 00.4% (18) 00.3% (21)
**** 00.9% (14) 01.0% (16) 02.1% ( 7) 00.0% N/A 00.8% (11) 00.5% (16) 00.5% (15)
[16] sandbox 00.2% (26) 00.5% (15) 00.0% N/A 00.0% N/A 00.3% (20) 00.3% (23) 00.0% N/A
**** 01.4% ( 8) 05.3% ( 3) 04.2% ( 3) 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A
[17] dos-flood 00.3% (21) 01.4% (12) 00.4% (24) 00.0% N/A 00.0% N/A 00.3% (24) 00.0% N/A
**** 01.1% (11) 03.9% ( 5) 00.9% (14) 00.5% (14) 00.8% ( 9) 00.3% (19) 01.3% ( 8)
[18] relpath 00.6% (17) 01.8% (10) 00.7% (17) 00.4% (18) 00.3% (16) 00.4% (19) 00.5% (18)
**** 00.7% (17) 01.4% (14) 00.0% N/A 00.5% (13) 01.9% ( 6) 00.0% N/A 01.1% (12)
[19] auth 00.1% (28) 00.5% (16) 00.0% N/A 00.0% N/A 00.3% (17) 00.0% N/A 00.3% (20)
**** 01.2% ( 9) 02.4% ( 7) 02.1% ( 8) 01.5% ( 6) 00.4% (15) 01.0% ( 6) 00.3% (18)
[20] pass 00.0% (32) 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.1% (28) 00.0% N/A
**** 01.1% (12) 00.5% (20) 01.5% (10) 00.5% (16) 02.3% ( 4) 00.8% (11) 01.1% ( 9)
[21] signedness 00.8% (15) 00.5% (17) 01.8% (11) 01.5% (10) 00.3% (19) 00.6% (17) 00.5% (16)
**** 00.2% (29) 00.0% N/A 00.0% N/A 00.5% (17) 00.0% N/A 00.5% (17) 00.0% N/A
[22] double-free 00.6% (18) 00.0% N/A 00.4% (22) 01.1% (16) 00.9% (14) 00.3% (25) 00.8% (12)
**** 00.2% (28) 00.0% N/A 00.0% N/A 00.5% (19) 00.8% (10) 00.3% (21) 00.0% N/A
[23] spoof 00.2% (23) 00.0% N/A 00.7% (20) 00.0% N/A 00.0% N/A 00.4% (21) 00.0% N/A
**** 00.3% (22) 00.5% (23) 00.0% N/A 00.0% N/A 00.0% N/A 00.3% (20) 01.1% (11)
[24] form-field 00.4% (20) 00.5% (20) 00.7% (19) 00.4% (20) 00.0% N/A 00.7% (16) 00.0% N/A
**** 00.1% (31) 00.5% (21) 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A
[25] crlf 00.5% (19) 00.0% N/A 01.1% (14) 00.0% N/A 00.0% N/A 00.7% (15) 00.5% (17)
**** 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A
[26] rand 00.2% (22) 00.9% (13) 00.4% (21) 00.4% (17) 00.0% N/A 00.0% N/A 00.3% (22)
**** 00.3% (23) 01.9% ( 9) 00.3% (22) 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A
[27] default 00.1% (29) 00.0% N/A 00.0% N/A 00.0% N/A 00.3% (18) 00.0% N/A 00.3% (23)
**** 00.4% (20) 00.5% (24) 00.6% (16) 00.0% N/A 00.0% N/A 00.8% ( 9) 00.3% (16)
[28] dos-release 00.1% (27) 00.5% (22) 00.4% (23) 00.4% (21) 00.0% N/A 00.0% N/A 00.0% N/A
**** 00.2% (27) 01.4% (11) 00.3% (21) 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A
[29] type-check 00.0% (34) 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.1% (26) 00.0% N/A
**** 00.3% (21) 01.4% (15) 00.9% (15) 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A
[30] CF 00.1% (30) 00.9% (14) 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A
**** 00.2% (26) 01.0% (19) 00.0% N/A 00.5% (18) 00.0% N/A 00.0% N/A 00.3% (22)
[31] eval-inject 00.2% (24) 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.4% (20) 00.5% (14)
**** 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A
[32] php-include 00.2% (25) 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.4% (22) 00.3% (19)
**** 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A
[33] design 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A
**** 00.2% (25) 00.5% (25) 00.3% (20) 00.5% (15) 00.0% N/A 00.3% (22) 00.0% N/A
[34] webroot 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A
**** 00.1% (30) 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.3% (20)
[35] upload 00.0% (33) 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.1% (29) 00.0% N/A
**** 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A
[36] CSRF 00.0% (31) 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.1% (27) 00.0% N/A
**** 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A
-------------------------
UNKNOWN/UNSPECIFIED ITEMS
-------------------------
n/a unk 09.7% N/A 12.2% N/A 10.3% N/A 04.5% N/A 07.8% N/A 11.5% N/A 10.1% N/A
**** 25.7% N/A 13.0% N/A 15.7% N/A 20.1% N/A 23.0% N/A 26.9% N/A 45.0% N/A
n/a other 19.3% N/A 13.1% N/A 20.6% N/A 15.7% N/A 10.4% N/A 15.9% N/A 39.4% N/A
**** 12.4% N/A 18.8% N/A 12.7% N/A 05.0% N/A 14.9% N/A 10.7% N/A 12.4% N/A
n/a not-specified 13.4% N/A 00.0% N/A 04.4% N/A 21.6% N/A 21.9% N/A 20.5% N/A 00.8% N/A
**** 13.2% N/A 00.5% N/A 06.3% N/A 28.6% N/A 22.6% N/A 24.3% N/A 00.5% N/A
Powered by blists - more mailing lists