Skip to content

CWE Top 25 Part 4

Published on

In this module, we review the CWE top 25 a list of the top 25 most dangerous software security weaknesses. We examine Improper Restriction of XML External Entity Reference, Use of Hard-coded Credentials, Deserialization of Untrusted Data, Improper Privilege Management, Uncontrolled Resource Consumption, Missing authentication for critical function, and Missing Authentication. We go over the consequences and mitigations of each of these weaknesses.