Skip to content

CWE Top 25 Part 2

Published on

In this module, we review the CWE top 25 a list of the top 25 most dangerous software security weaknesses. We examine Information Exposure, Use After Free, Cross-Site Request Forgery, OS Command Injection, Integer Overflow or Wraparound, and Path Traversal. We go over the consequences and mitigations of each of these weaknesses.