Thread-topic: Vulnerability Type Distributions in CVE
> -----Original Message-----
> From: Steven M. Christey [mailto:coley@xxxxxxxxxxxxxxx]
> Sent: Thursday, October 05, 2006 3:19 AM
> To: bugtraq@xxxxxxxxxxxxxxxxx
> Subject: Vulnerability Type Distributions in CVE
>
>
> (note: HTML versions of the tables in this paper are included on the
> web site, whose URL is given below. Some mailing list programs seem
> to be mishandling the encoding of the HTML tables, or rejecting them
> due to size constraints.)
>
>
> ==========================================================
> Vulnerability Type Distributions in CVE
> ==========================================================
> Author: Steve Christey
> Date: October 4, 2006
> Document version: 1.0
> URL: http://cwe.mitre.org/documents/vuln-trends.html
>
>
> This is a draft report and does not represent an official position of
> The MITRE Corporation. Copyright (c) 2006, The MITRE Corporation. All
> rights reserved. Permission is granted to redistribute this document
> if this paragraph is not removed. This document is subject to change
> without notice.
>
>
> =============================
> ===== Table of Contents =====
> =============================
>
> Introduction
> Summary of Results
> Data Sets
> Trend Table Color Key
> Table 1 Analysis: Overall Trends
> Table 2 and 3 Analysis: OS vs. non-OS
> Table 4 Analysis: Open and Closed Source
> Possible Future Work
> Notes on Potential Bias
> (In)Frequently Asked Questions
> Credits
> References
> Flaw Terminology
> Table 1: Overall Results
> Table 2: OS Vendors
> Table 3: OS Vendors vs. Others
> Table 4: Open and Closed Source (OS vendors)
>
>
> ========================
> ===== Introduction =====
> ========================
>
> For the past 5 years, CVE has been tracking the types of errors that
> lead to publicly reported vulnerabilities, and periodically reporting
> trends on a limited scale. In support of the Common Weakness
> Enumeration (CWE) project [1], and as a result of the interest in this
> work as mentioned during the "Year of the web application: Hack & Data
> from the Front lines" panel at the 5th Annual Cyber Security Executive
> Summit in New York City on September 13, 2006, we have published a
> more extensive analysis. An updated version will be released once
> 2006 is complete.
>
> The primary goal of this study is to better understand research trends
> using publicly reported vulnerabilities. It should be noted that the
> data is obtained from an uncontrolled population, i.e., decentralized
> public reports from a research community with diverse goals and
> interests, with an equally diverse set of vendors and developers.
> More specialized, exhaustive, and repeatable methods could be devised
> to evaluate software security. But until such methods reach maturity
> and widespread acceptance, the overall state of software security can
> be viewed through the lens of public reports.
>
> ==============================
> ===== Summary of Results =====
> ==============================
>
> 1) The total number of publicly reported web application
> vulnerabilities has risen sharply, to the point where they have
> overtaken buffer overflows. This is probably due to ease of
> detection and exploitation of web vulnerabilities, combined with
> the proliferation of low-grade software applications. In 2005 and
> 2006, cross-site scripting (XSS) was number 1, and SQL injection
> was number 2. PHP remote file inclusion is number 3 in 2006;
> because it allows arbitrary code execution on a vulnerable server,
> this is a worrisome trend, although proper configuration is
> frequently enough to eliminate it.
>
> 2) Buffer overflows are still the number 1 issue as reported in
> operating system (OS) vendor advisories. XSS is still high in this
> category, at number 2 in 2005 and number 3 in 2006, although other
> web application vulnerabilities appear much less frequently.
>
> 3) Integer overflows, barely in the top 10 overall in the past few
> years, are in the top 3 for OS vendor advisories. This might
> indicate expert researcher interest in high-profile software.
>
> 4) There are noticeable differences in the types of vulnerabilities
> being reported in open and closed source OS vendor advisories.
> These merit further investigation because they might reflect
> important differences in development, research, and disclosure
> practices.
>
> 5) The data is inconclusive regarding whether there is a concrete
> improvement in overall software security. While there is a rise in
> "new" vulnerability classes, the raw numbers for older classes have
> not changed significantly. Further investigation is also required
> in this area.
>
>
> =====================
> ===== Data Sets =====
> =====================
>
> Three main data sets were used in this analysis.
>
> OVERALL: this data set consists of all CVEs that were first publicly
> reported in 2001 or later (earlier CVEs do not have the appropriate
> fields filled out.) CVE includes all types of software, whether from
> a major vendor or an individual hobbyist programmer, as long as the
> associated vulnerability has been reported by the developer or posted
> by a researcher or third party to sources such as mailing lists and
> vulnerability databases. CVE only includes distributable software,
> i.e., it does not include issues that are reported for custom software
> in specific web sites. While CVE data is incomplete, it is estimated
> that it is 80% complete relative to all major mailing lists and
> vulnerability databases, with the likely exception of data from 2003.
>
> OS VENDOR: this data set identifies CVEs that are associated with
> operating system (OS) vendor advisories, which would capture
> vulnerabilities in the kernel, as well as applications that are
> supported by the OS vendor. The data was limited to CVEs that have
> one or more references from the following sources. For open source OS
> vendors, the following sources were used: DEBIAN, FREEBSD,
> MANDRAKE/MANDRIVA, NETBSD, OPENBSD, REDHAT, and SUSE. The closed
> source OS vendors included: AIXAPAR, APPLE, CISCO, HP, MS, MSKB, SCO,
> SGI, SUN, and SUNALERT. CVE does not have the internal data fields to
> support more fine-grained analysis for major non-OS vendors.
>
> OPEN/CLOSED SOURCE: open and closed source operating system (OS)
> vendors were using the same methods and categories as described in the
> "OS VENDOR" section. Because some closed source vendors such as Apple
> have significant codebase overlap with open source products, any
> overlapping CVEs were removed from the data set. Both open and closed
> sets had at least 1700 vulnerabilities.
>
> In each data set, vulnerabilities were not removed if they were marked
> as "disputed." Many disputes are incorrect or unresolved.
>
> =================================
> ===== Trend Table Color Key =====
> =================================
>
> In the HTML pages, the following color key is used for trend tables.
>
> GRAY: used in comparisons to help visually separate one data set from
> another
>
> RED: a top 10 for that year
>
> GREEN: during that year, the vulnerability's rank was at least 5
> points BELOW the average rank for that vulnerability
>
> YELLOW: during that year, the vulnerability's rank was at least 5
> points ABOVE the average rank for that vulnerability
>
> So, green on the left indicates vulns with RISING popularity, as will
> yellow on the right. Green on the right indicates vulns with FALLING
> popularity, as will yellow on the left.
>
>
> ============================================
> ===== Table 1 Analysis: Overall Trends =====
> ============================================
>
> The most notable trend is the sharp rise in public reports for
> vulnerabilities that are specific to web applications.
>
> Buffer overflows were number 1 year after year, but that changed in
> 2005 with the rise of web application vulnerabilities, including
> cross-site scripting (XSS), SQL injection, and remote file inclusion,
> although SQL injection is not limited just to web applications. In
> fact, so far in 2006, buffer overflows are only #4.
>
> There are probably several contributing factors to this increase in
> web vulnerabilities:
>
> 1) The most basic data manipulations for these vulnerabilities are
> very simple to perform, e.g., "'" for SQL injection and
> "<script>alert('hi')</script>" for XSS. This makes it easy for
> beginning researchers to quickly test large amounts of software.
>
> 2) There is a plethora of freely available web applications. Much of
> the code is alpha or beta, written by inexperienced programmers
> with easy-to-learn languages such as PHP, and distributed on
> high-traffic sites. The applications might have a small or
> non-existent user base. Such software is often rife with
> easy-to-find vulnerabilities, and it is often a target for
> beginning researchers. The large number of these
> "fish-in-a-barrel" applications is probably a major contributor to
> the overall trends.
>
> 3) With XSS, every input has the potential to be an attack vector,
> which does not occur with other vulnerability types. This leaves
> more opportunity for a single mistake to occur in a program that
> otherwise protects against XSS. SQL injection also has many
> potential attack vectors.
>
> 4) Despite popular opinion that XSS is easily prevented, it has many
> subtleties and variants. Even solid applications can have flaws in
> them; consider non-standard browser behaviors that try to "fix"
> malformed HTML, which might slip by a filter that uses regular
> expressions. Finally, until early 2006, the PHP interpreter had a
> vulnerability in which it did not quote error messages, but many
> researchers only reported the surface-level "resultant" XSS instead
> of figuring out whether there was a different "primary"
> vulnerability that led to the error.
>
> 5) There is some evidence that over the past couple of years, web
> defacers have taken an interest in performing and publishing their
> own research. This is probably due to the ease of finding
> vulnerabilities, combined with the presence of high-risk problems
> such as PHP file inclusion, which can be used to remotely install
> powerful, easily-available backdoor code. Based on customer posts
> to numerous vendor forums, there is solid evidence that remote file
> inclusion is regularly used to compromise web servers, which also
> helps to explain its popularity.
>
>
> Overall Trends: Other Interesting Results
> -----------------------------------------
>
> 1) For 2006, the top 5 vulnerability types are responsible for 57% of
> all CVEs. With over 35 vulnerability types used in this report,
> and dozens more as currently identified in CWE, this shows how most
> public reports concentrate only on a handful of vulnerability
> types.
>
> 2) PHP remote file inclusion (php-include) has been steadily gaining
> ground since 2001, enough so that it is number 3 at this point in
> 2006. See items (2) and (5) from the previous section for a
> possible explanation.
>
> 3) Over the years, there has been a noticeable decline in shell
> metacharacters, symbolic link following, and directory traversal.
> It is unclear whether software is actually improving with respect
> to these problems, or if they are not investigated as frequently.
>
> 4) Information leaks (infoleak) appear regularly. There are 2 main
> reasons for the prominence: "information leak" is a more general
> class than others (see CWE for more precise sub-categories), and
> when an error message includes a full path, that is usually
> categorized as an information leak, although it might be resultant
> from a separate primary vulnerability.
>
> 5) The inability to handle malformed inputs (dos-malform), which
> usually leads to a crash or hang, is also a general class.
> Malformed-input vulnerabilities have not been studied as closely as
> injection vulnerabilities, at least with respect to identifying the
> root cause of the problem. Also, many reports do not specify how
> an input is malformed. There are likely many cases in which a
> researcher accidentally triggers a more serious vulnerability but
> does not perform sufficient diagnosis to determine the primary
> issue. Finally, vendor reports might only identify an issue as
> being related to "malformed input," which obscures the primary
> cause.
>
> 6) As the percentage of buffer overflows has declined, there has been
> an increase in related vulnerability types, including integer
> overflows (int-overflow), signedness errors, and double frees
> (double-free). These are still very low-percentage, probably due
> to their relative newness and difficulty of detection compared to
> classic overflows. In addition, these newly emerging vulnerability
> types might be labeled as buffer overflows, since they often lead
> to buffer overflows, and the "buffer overflow" term is used
> interchangeably for attack, cause, and effect.
>
> 7) Other interesting web application vulnerabilities are webroot
> (storage of sensitive files under the web document root),
> form-field (web parameter tampering), upload of files with
> executable extensions (e.g., file.php.gif), eval injection, and
> Cross-Site Request Forgery (CSRF).
>
>
> ==================================================
> ===== Table 2 and 3 Analysis: OS vs. non-OS ======
> ==================================================
>
> Given the increase in web application vulnerabilities and the
> likelihood that it is partially due to researcher interest in software
> with small user bases, an analysis was performed based solely on
> advisories from operating system (OS) vendors. These advisories
> frequently include the OS kernel and key applications that are
> supported by the vendor. See the Data Sets section for more
> information. Unfortunately, more precise data sets could not be
> generated.
>
> Table 2 provides the data for OS vendor advisories alone. Table 3
> contrasts the OS vendor advisories with all other reported issues.
>
> There are several notable results:
>
> 1) Integer overflows are heavily represented in OS vendor advisories,
> rising to number 2 so far in 2006, even though they represent a
> small percentage of vulnerabilities overall. This probably
> reflects growing interest by expert researchers in finding integer
> overflows, along with the tendency of expert researchers to
> evaluate widely deployed software. The affected software ranges
> widely, including the kernel, cryptographic modules, and multimedia
> file processors such as image viewers and music players. After
> 2004, many of the reported issues occur in libraries or common
> DLLs.
>
> 2) Buffer overflows are still #1. This is probably due to
> under-representation of web applications in OS advisories, relative
> to other CVEs. In addition, as related issues like integer
> overflows increase, they might be detected or reported as buffer
> overflows, since buffer overflows are frequently resultant from
> integer overflows.
>
> 3) XSS is still very common, even in OS advisories, and it appears
> with the same frequency as integer overflows in 2006. An informal
> analysis shows that the affected software includes web servers, web
> browsers, email clients, administrative interfaces, and Wiki/CMS.
>
> 4) With the exception of XSS, there is a wide gulf between web-related
> vulnerabilities in OS advisories and other issues. SQL injection
> is not even in the top 10 for OS advisories, and PHP remote file
> inclusion is practially nonexistent. Many other web-related
> vulnerabilities occupy the bottom of the chart. For SQL injection,
> it is possible that most OS-supported applications do not use
> databases, or aren't web accessible. SQL injection vulnerabilities
> are not web-specific, but it seems that they are rarely reported
> for non-web applications, so it is possible that this reflects some
> researcher bias.
>
> 5) Directory traversal and format string vulnerabilities are
> frequently reported at a higher rate in OS vendor advisories than
> elsewhere. The reason is unclear, because these vulnerabilities
> are not restricted to local attack vectors, so one might expect
> that they would also appear regularly in web applications.
> However, it is likely that researchers do not focus on format
> strings because they are rarely exploitable for code execution in
> languages other than C. In the case of PHP, many PHP functions are
> subject to both remote file inclusion and directory traversal, and
> it might be that only the file inclusion is publicly reported. (In
> fact, the overlap is so close that this sometimes causes
> difficulties with classification).
>
> 6) In 2006 so far, more than a quarter (27%) of the OS vendor
> advisories did not have sufficient details to actually classify the
> vulnerability (type "unk"). This is in sharp contrast to the
> non-OS issues, which comprise less than 8%. However, because of
> the data sets in question, the non-OS CVEs will include many
> non-coordinated disclosures that would, by their nature, require
> more details. The next table will demonstrate that it is not just
> closed source vendor advisories that omit sufficient details for
> vulnerability classification.
>
> 7) The "top 5" and "top 10" vulnerabilities in each year are a much
> smaller percentage of total vulnerabilities in OS vendor advisories
> than non-OS issues. For example, in 2005, the top 5 totaled 29.4%
> for OS issues, but 55% for non-OS. For OS issues, this suggests an
> increasing diversity in the kinds of vulnerabilities being
> reported, whereas for other issues, that diversity appears to be
> decreasing. However, this could be another reflection of the
> domination of web application vulnerabilities.
>
>
>
> ====================================================
> ===== Table 4 Analysis: Open and Closed Source =====
> ====================================================
>
> Table 4 compares the vulnerability type distribution between the open
> source and closed source operating system (OS) vendors. See the "Data
> Sets" section for more information on how the data sets were
> generated. As a reminder, CVEs that overlapped both open and closed
> source sets were omitted.
>
> IMPORTANT: it is inappropriate to use these results to compare the
> relative security of open and closed source products, so the report
> excludes raw numbers. Both sets had at least 1700 vulnerabilities.
> There are too many variations in vendor advisory release policies,
> possible differences in research techniques, and other factors cited
> in [2]. And, simply put, there is too much potential for raw numbers
> to be misused and misinterpreted.
>
> However, some results pose interesting questions that merit more
> in-depth investigation. These discrepancies might reflect differences
> in vulnerability research techniques, researcher sub-communities,
> vendor disclosure policies, and development practices and APIs, but
> this has not been proven.
>
> The research and vendor communities are encouraged to investigate the
> underlying causes for these differences, which could provide lessons
> learned for all software developers, open and closed source alike.
>
> Some of the most notable results are:
>
> 1) The percentage of "unknown" vulnerabilities - those that could not
> be classified due to lack of details - is significantly higher in
> closed source than open source advisories, and 45% so far for 2006.
> With such a wide discrepancy, it is difficult to know whether any
> of the remaining results in this section are significant. It
> should be noted that 10% of issues in open source advisories do not
> have enough details to classify the problem.
>
> 2) Buffer overflows are number 1 for both open and closed, with
> roughly the same percentage over the years.
>
> 3) Symbolic link vulnerabilities appear at a higher rate in open
> source than closed source, although this might be due to the
> non-Unix OSes in the data set. While Windows has "shortcuts"
> (.LNK) that are similar to Unix links, they appear very rarely in
> Microsoft advisories, or for Windows-based applications. It is not
> clear whether this is due to under-research or API/development
> differences. The author recalls that at least one Linux researcher
> appeared to concentrate on symbolic link issues in 2004 and 2005,
> so researcher bias might also be a factor.
>
> 4) Malformed-input vulnerabilities appear more frequently in closed
> source advisories than open source. This might be due to a lack of
> details in closed source advisories. If an advisory mentions a
> problem due to "malformed data," it might be assigned the
> dos-malform type. Another factor might be due to black box
> techniques. It seems likely that fuzzers and other tools would be
> used more frequently against closed source products than open
> source, but this is not known.
>
> 5) XSS vulnerabilities appear more frequently in open source
> advisories than closed, but this might be a reflection of vendor
> release policies for advisories. It seems that open source vendors
> are more likely to release advisories for smaller packages.
>
> 6) Format string vulnerabilities appear more frequently in open
> source. There are probably several factors. First, susceptible
> API library calls such as printf() are easily found in source code
> using crude methods, whereas binary reverse engineering techniques
> are not conducted by many researchers (this might also be an
> explanation for symbolic link issues). Second, many format string
> problems seem to occur in rarely-triggered error conditions, which
> makes them more difficult to test with black box methods.
>
> Perhaps most surprising: it appears that, since 2003, the non-Unix
> closed source advisories have not mentioned any format strings. It
> is not clear why there would be such a radical difference, although
> it could be due to the lack of details in those advisories.
>
> 7) Integer overflows have been roughly the same rank for open and
> closed source. This is a curious similarity, since one might not
> expect open and closed source analysis techniques to be equally
> capable in finding these problems.
>
> 8) Another interesting example is in the use of default passwords.
> Over the years, very few open source vendor advisories have
> mentioned default passwords, whereas they appear with some
> regularity in closed source advisories. It is not clear whether
> this is a difference in shipping/configuration practices or vendor
> disclosure policies.
>
> 9) Shell metacharacter issues appear less frequently in non-Unix
> closed source than other closed source advisories. This result was
> found by a separate analysis; it is not evident in Table 4. This
> could be due to usage patterns of API functions such as
> CreateProcess() for Windows, and system() for Unix. This result is
> being reported because it is the most concrete example of how API
> functions might play a role in implementation-level
> vulnerabilities.
>
>
> ================================
> ===== Possible Future Work =====
> ================================
>
> 1) The vulnerability types could be tied to other CVE-normalized data,
> such as IDS, incident databases, or vulnerability scanning results.
> This could determine the types of vulnerabilities that are being
> actively exploited or detected in real-world enterprises.
>
> 2) More precise classification could be informative. Approximately
> 30% of CVEs have vulnerability types that cannot be described using
> the current classification scheme. Another 15% are "unknown"
> vulnerabilities whose disclosures do not have sufficient details to
> determine any vulnerability type, but this problem is unavoidable,
> since some vendors do not release these details.
>
> 3) A crude measure of researcher diversity might be possible by
> linking data to other vulnerability databases that record this
> information. This could be used to determine if the raw number of
> researchers is increasing (probably), how that rate is increasing
> relative to the number of vulnerabilities (unknown), and how many
> different bug types are found by the average researcher (probably
> fairly small). If such data is available, then a further breakdown
> could be performed based on professional researchers versus others.
>
> 4) More precise data sets could be identified, such as a cross-section
> of market leaders in various product categories, not just OS vendor
> advisories. CVE does not record this type of information.
>
> ===================================
> ===== Notes on Potential Bias =====
> ===================================
>
> The diversity of both researchers and vendor disclosure practices
> introduces several unmeasurable biases, as described in more detail in
> [2].
>
> In the overall results, 2003's issues have 20% with vulnerabilities
> that are "not specified" by the CVE analyst, which is inconsistent
> with statistics from other years. Many of these vulnerabilities were
> reviewed after this discovery, and they are in fact of type "other."
> This discrepancy has not been sufficiently explained, although it is
> probably at least partially due to the relative percentage of CVEs in
> OS vendor advisories to other CVEs, since 2003 was a low-output year
> for CVE and thus the concentration was in high-priority software.
>
> Some vulnerability types are probably under-represented due to
> classification difficulty. For example, the "form-field" type (web
> parameter tampering) might occasionally get classified as an
> authentication error, depending on how the original researcher reports
> the issue.
>
>
> ==========================================
> ===== (In)Frequently Asked Questions =====
> ==========================================
>
> 1) Why aren't you giving out raw numbers for open vs. closed source?
>
> Answer: we already said why. See paragraph 2 of the Table 4
> analysis for a reminder.
>
> 2) Why are you releasing this report now, with incomplete 2006 data?
>
> Answer: when MITRE mentioned the preliminary results at the Cyber
> Security Executive Summit on September 13, there was a lot more
> interest than we had originally anticipated. Subsequent discussion
> of the results might help us to provide a better report when 2006
> is done.
>
> 3) How does this compare with the other summaries you've posted in the
> past? Why have the numbers and percentages changed for older
> years?
>
> Answer: (1) we occasionally add CVEs for older issues, (2) some of
> the previously released summaries were cumulative instead of
> offering a year-by-year breakdown, and (3) eventually, as a new
> type of vulnerability is reported more frequently, the CVE project
> notices it enough to give it a name, or at least a type. Once we
> do that, we can go back and update the older CVEs that also had the
> issue. However, we often rely on keyword searches in CVE
> descriptions for doing these kinds of updates. The earliest
> reports of new vulnerability types probably don't get captured
> fully, because CVE descriptions frequently vary in the early days
> or months of a new vulnerability type. Most updates to these
> vulnerability trends trigger an informal review of the "other"
> vulnerabilities for the data set in order to update the type
> fields.
>
> 4) There are a lot more vulnerability types than what you've covered.
>
> Answer: That's an observation, not a question. If a certain
> vulnerability type is not on the list, then it probably didn't
> appear frequently enough for the CVE project to track closely.
> There are several reasons: (1) the vulnerability type is selected
> from a large dropdown menu during CVE refinement, but also (2) our
> work in the Common Weakness Enumeration (CWE) is producing hundreds
> of vuln types, and we want that to become a little more stable
> before doing the next round of modifications to CVE data. Finally,
> (3) with approximately 3,500 vulnerabilities marked "other" or "not
> specified", it is cost-prohibitive to review each CVE when the set
> of categories is updated.
>
> 5) Why isn't my favorite web vulnerability here?
>
> Answer: Many web vulnerabilities are difficult to classify because
> they are "multi-factor," i.e., they are composed of multiple bugs,
> weaknesses, and/or design limitations. Other web issues are really
> just specialized attacks that use other primary vulnerabilities.
> For example, most HTTP response splitting problems rely on CRLF
> injection, so they are classified under CRLF injection.
>
>
> ===================
> ===== Credits =====
> ===================
>
> Large-scale trend analyses like this are not possible without the body
> of knowledge that has been formed by hundreds or thousands of
> researchers, from hobbyists to professionals.
>
> Thanks to the following for substantive feedback on the initial draft,
> sometimes in the form of a question that required more investigation:
> Bill Heinbockel, Chris Wysopal, and Mark Curphey.
>
>
> ======================
> ===== References =====
> ======================
>
> [1] CWE, http://cwe.mitre.org
>
> [2] "Open Letter on the Interpretation of 'Vulnerability Statistics'"
> Bugtraq, Full-Disclosure
> January 5, 2006
>
> http://lists.grok.org.uk/pipermail/full-disclosure/2006-Januar
> y/041028.html
>
>
> ============================
> ===== Flaw Terminology =====
> ============================
>
> Type: auth
> CWE: CWE-289, CWE-288, CWE-302, CWE-305, CWE-294, CWE-290,
> CWE-287, CWE-303
> Description:
> Weak/bad authentication problem
>
> Type: buf
> CWE: CWE-119, CWE-120, others
> Description:
> Buffer overflow
>
> Type: CF
> CWE: none
> Description:
> General configuration problem, not perm or default
>
> Type: crlf
> CWE: CWE-93
> Description:
> CRLF injection
>
> Type: crypt
> CWE: CWE-310, CWE-311, CWE-347, CWE-320, CWE-325
> Description:
> Cryptographic error (poor design or implementation), including
> plaintext storage/transmission of sensitive information.
>
> Type: CSRF
> CWE: CWE-352
> Description:
> Cross-Site Request Forgery (CSRF)
>
> Type: default
> CWE: N/A
> Description:
> Insecure default configuration, e.g., passwords or permissions
>
> Type: design
> CWE: none
> Description:
> Design problem, generally in protocols or programming languages.
> Since 2005, its use has been limited due to the highly general nature
> of this type.
>
> Type: dos-flood
> CWE: CWE-400
> Description:
> DoS caused by flooding with a large number of *legitimately formatted*
> requests/etc.; normally DoS is a crash, or spending a lot more time on
> a task than it "should"
>
> Type: dos-malform
> CWE: CWE-238, CWE-234, CWE-166, CWE-230, many others
> Description:
> DoS caused by malformed input
>
> Type: dos-release
> CWE: CWE-404
> Description:
> DoS because system does not properly release resources
>
> Type: dot
> CWE: CWE-22, CWE-23, CWE-36
> Description:
> Directory traversal (file access via ".." or variants)
>
> Type: double-free
> CWE: CWE-415
> Description:
> Double-free vulnerability
>
> Type: eval-inject
> CWE: CWE-95
> Description:
> Eval injection
>
> Type: form-field
> CWE: CWE-472
> Description:
> CGI program inherently trusts form field that should not be modified
> (i.e., should be stored locally)
>
> Type: format-string
> CWE: CWE-134
> Description:
> Format string vulnerability; user can inject format specifiers during
> string processing.
>
> Type: infoleak
> CWE: CWE-205, CWE-212, CWE-203, CWE-209, CWE-207, CWE-200,
> CWE-215, others
> Description:
> Information leak by a product, which is not the result of another
> vulnerability; typically by design or by producing different "answers"
> that suggest the state; often related to configuration / permissions
> or error reporting/handling.
>
> Type: int-overflow
> CWE: CWE-190
> Description:
> A numeric value can be incremented to the point where it overflows and
> begins at the minimum value, with security implications. Overlaps
> signedness errors.
>
> Type: link
> CWE: CWE-61, CWE-64
> Description:
> Symbolic link following
>
> Type: memleak
> CWE: CWE-401
> Description:
> Memory leak (doesn't free memory when it should); use this instead of
> dos-release
>
> Type: metachar
> CWE: CWE-78
> Description:
> Unescaped shell metacharacters or other unquoted "special" char's;
> currently includes SQL injection but not XSS.
>
> Type: msdos-device
> CWE: CWE-67
> Description:
> Problem due to file names with MS-DOS device names.
>
> Type: not-specified
> CWE: none
> Description:
> The CVE analyst has not assigned a flaw type to the issue, typically
> similar to "other".
>
> Type: other
> CWE: none
> Description:
> Other vulnerability; issue could not be described with an available
> type at the time of analysis.
>
> Type: pass
> CWE: CWE-259
> Description:
> Default or hard-coded password
>
> Type: perm
> CWE: CWE-276
> Description:
> Assigns bad permissions, improperly calculates permissions, or
> improperly checks permissions
>
> Type: php-include
> CWE: CWE-98
> Description:
> PHP remote file inclusion
>
> Type: priv
> CWE: CWE-266, CWE-274, CWE-272, CWE-250, CWE-264, CWE-265,
> CWE-268, CWE-270, CWE-271, CWE-269, CWE-267
> Description:
> Bad privilege assignment, or privileged process/action is
> unprotected/unauthenticated.
>
> Type: race
> CWE: CWE-362, CWE-366, CWE-364, CWE-367, CWE-421, CWE-368,
> CWE-363, CWE-370
> Description:
> General race condition (NOT SYMBOLIC LINK FOLLOWING (link)!)
>
> Type: rand
> CWE: CWE-330, CWE-331, CWE-332, CWE-338, CWE-342, CWE-341,
> CWE-339, others
> Description:
> Generation of insufficiently random numbers, typically by using easily
> guessable sources of "random" data
>
> Type: relpath
> CWE: CWE-426, CWE-428, CWE-114
> Description:
> Untrusted search path vulnerability - Relies on search paths to find
> other executable programs or files, opening up to Trojan horse
> attacks, e.g., PATH environment variable in Unix.
>
> Type: sandbox
> CWE: CWE-265
> Description:
> Java/etc. sandbox escape - NOT BY DOT-DOT!
>
> Type: signedness
> CWE: CWE-195, CWE-196
> Description:
> Signedness error; a numeric value in one format/representation is
> improperly handled when it is used as if it were another
> format/representation. Overlaps integer overflows and array index
> errors.
>
> Type: spoof
> CWE: CWE-290, CWE-350, CWE-347, CWE-345, CWE-247, CWE-292, CWE-291
> Description:
> Product is vulnerable to spoofing attacks, generally by not properly
> verifying authenticity.
>
> Type: sql-inject
> CWE: CWE-89
> Description:
> SQL injection vulnerability
>
> Type: type-check
> CWE: unknown
> Description:
> Product incorrectly identifies the type of an input parameter or file,
> then dispatches the wrong "executable" (possibly itself) to process
> the input, or otherwise misrepresents the input in a security-critical
> way.
>
> Type: unk
> CWE: none
> Description:
> Unknown vulnerability; report is too vague to determine type of issue.
>
> Type: upload
> CWE: CWE-434
> Description:
> Product does not restrict the extensions for files that can be
> uploaded to the web server, leading to code execution if executable
> extensions are used in filenames, such as .asp, .php, and .shtml.
>
> Type: webroot
> CWE: CWE-219, CWE-433
> Description:
> Storage of sensitive data under web document root with insufficient
> access control.
>
> Type: XSS
> CWE: CWE-79, CWE-80, CWE-87, CWE-85, CWE-82, CWE-81, CWE-83, CWE-84
> Description:
> Cross-site scripting (aka XSS)
>
>
>
> ====================================
> ===== Table 1: Overall Results =====
> ====================================
>
>
> TOTAL 2001 2002
> 2003 2004 2005 2006
> (16192) (1434) (2138)
> (1173) (2534) (4538) (4375)
> ---------- ---------- ----------
> ---------- ---------- ---------- ----------
> [ 1] XSS 13.9% ( 1) 02.2% (11) 08.7% ( 2)
> 07.5% ( 2) 10.9% ( 2) 16.0% ( 1) 21.5% ( 1)
> 2247 32 187 88
> 276 725 939
> [ 2] buf 13.3% ( 2) 19.5% ( 1) 20.3% ( 1)
> 22.5% ( 1) 15.4% ( 1) 09.8% ( 3) 07.9% ( 4)
> 2156 279 433 264
> 391 445 344
> [ 3] sql-inject 08.7% ( 3) 00.4% (27) 01.8% (12)
> 03.0% ( 4) 05.5% ( 3) 12.9% ( 2) 14.0% ( 2)
> 1416 6 38 35
> 140 584 613
> [ 4] dot 04.7% ( 4) 08.9% ( 2) 05.1% ( 3)
> 02.9% ( 5) 04.1% ( 4) 04.3% ( 4) 04.4% ( 5)
> 764 127 110 34
> 104 195 194
> [ 5] php-include 03.5% ( 5) 00.1% (31) 00.3% (30)
> 00.8% (15) 01.4% (10) 02.1% ( 6) 09.5% ( 3)
> 561 1 6 9
> 36 95 414
> [ 6] infoleak 03.3% ( 6) 02.6% ( 9) 04.2% ( 5)
> 02.6% ( 7) 03.7% ( 5) 03.9% ( 5) 02.6% ( 6)
> 540 37 89 30
> 95 175 114
> [ 7] dos-malform 02.9% ( 7) 04.8% ( 3) 05.1% ( 4)
> 02.5% ( 8) 03.4% ( 6) 01.8% ( 8) 02.0% ( 7)
> 463 69 110 29
> 87 82 86
> [ 8] link 02.0% ( 8) 04.5% ( 4) 02.1% ( 9)
> 03.5% ( 3) 02.8% ( 7) 01.9% ( 7) 00.5% (16)
> 329 64 45 41
> 72 87 20
> [ 9] format-string 01.8% ( 9) 03.2% ( 7) 01.8% (11)
> 02.7% ( 6) 02.4% ( 8) 01.7% ( 9) 01.0% (10)
> 296 46 39 32
> 61 76 42
> [10] crypt 01.6% (10) 03.8% ( 6) 02.7% ( 6)
> 01.5% ( 9) 00.9% (16) 01.5% (10) 00.9% (11)
> 261 55 58 18
> 22 68 40
> [11] priv 01.4% (11) 02.5% (10) 02.2% ( 8)
> 01.0% (12) 01.3% (11) 01.5% (11) 00.9% (12)
> 233 36 46 12
> 32 67 40
> [12] metachar 01.3% (12) 03.8% ( 5) 02.6% ( 7)
> 00.7% (17) 01.0% (14) 01.3% (12) 00.3% (20)
> 218 55 56 8
> 26 59 14
> [13] perm 01.3% (13) 02.7% ( 8) 01.8% (10)
> 01.3% (11) 00.9% (15) 01.1% (13) 01.1% ( 9)
> 215 39 39 15
> 24 48 50
> [14] int-overflow 01.0% (14) 00.1% (32) 00.4% (22)
> 01.4% (10) 01.9% ( 9) 00.8% (15) 01.2% ( 8)
> 160 1 8 16
> 47 36 52
> [15] dos-flood 00.8% (15) 02.0% (12) 01.7% (13)
> 00.5% (19) 01.2% (12) 00.2% (27) 00.4% (17)
> 131 29 36 6
> 31 10 19
> [16] pass 00.8% (16) 01.1% (18) 01.3% (14)
> 00.2% (28) 01.1% (13) 00.8% (14) 00.4% (18)
> 125 16 27 2
> 28 36 16
> [17] auth 00.8% (17) 01.5% (13) 01.3% (15)
> 00.5% (20) 00.7% (17) 00.5% (19) 00.7% (14)
> 124 22 27 6
> 17 21 31
> [18] webroot 00.5% (18) 00.1% (29) 00.2% (32)
> 00.3% (24) 00.2% (30) 00.7% (16) 00.9% (13)
> 88 2 5 3
> 5 33 40
> [19] form-field 00.5% (19) 00.7% (24) 00.8% (17)
> 00.5% (21) 00.2% (27) 00.4% (20) 00.5% (15)
> 81 10 17 6
> 6 19 23
> [20] relpath 00.4% (20) 00.8% (22) 00.3% (29)
> 00.9% (14) 00.6% (18) 00.3% (22) 00.3% (21)
> 71 12 6 10
> 14 15 14
> [21] race 00.4% (21) 00.5% (26) 00.4% (24)
> 00.6% (18) 00.4% (21) 00.6% (17) 00.3% (24)
> 69 7 8 7
> 10 26 11
> [22] memleak 00.4% (22) 01.1% (17) 00.2% (31)
> 00.4% (22) 00.5% (19) 00.3% (23) 00.2% (27)
> 61 16 5 5
> 13 15 7
> [23] msdos-device 00.4% (23) 01.0% (20) 00.6% (19)
> 00.9% (13) 00.2% (23) 00.2% (28) 00.0% (32)
> 57 15 13 11
> 6 10 2
> [24] crlf 00.3% (24) 00.0% N/A 00.2% (33)
> 00.1% (30) 00.5% (20) 00.4% (21) 00.3% (19)
> 49 0 4 1
> 13 17 14
> [25] default 00.3% (26) 01.1% (16) 00.7% (18)
> 00.1% (33) 00.2% (26) 00.1% (33) 00.1% (29)
> 48 16 16 1
> 6 3 6
> [26] spoof 00.3% (25) 01.0% (19) 00.3% (28)
> 00.1% (32) 00.1% (33) 00.2% (26) 00.3% (25)
> 48 15 7 1
> 3 11 11
> [27] sandbox 00.3% (27) 01.2% (15) 01.0% (16)
> 00.0% N/A 00.2% (29) 00.0% (34) 00.0% N/A
> 46 17 22 0
> 5 2 0
> [28] rand 00.3% (28) 01.2% (14) 00.6% (20)
> 00.3% (25) 00.2% (32) 00.0% (35) 00.2% (26)
> 45 17 12 3
> 4 2 7
> [29] upload 00.3% (29) 00.0% N/A 00.0% (36)
> 00.1% (29) 00.2% (24) 00.5% (18) 00.3% (22)
> 43 0 1 1
> 6 22 13
> [30] signedness 00.2% (30) 00.1% (30) 00.4% (23)
> 00.8% (16) 00.2% (25) 00.3% (24) 00.0% (34)
> 38 1 8 9
> 6 12 2
> [31] dos-release 00.2% (31) 00.9% (21) 00.5% (21)
> 00.2% (27) 00.2% (31) 00.0% N/A 00.0% N/A
> 30 13 10 2
> 5 0 0
> [32] CF 00.2% (32) 00.7% (23) 00.3% (27)
> 00.2% (26) 00.0% N/A 00.1% (31) 00.1% (28)
> 29 10 7 2
> 0 4 6
> [33] eval-inject 00.2% (33) 00.0% N/A 00.0% N/A
> 00.0% N/A 00.0% (34) 00.2% (25) 00.3% (23)
> 25 0 0 0
> 1 11 13
> [34] design 00.1% (34) 00.6% (25) 00.4% (26)
> 00.1% (31) 00.0% (35) 00.1% (32) 00.0% (31)
> 23 8 8 1
> 1 3 2
> [35] double-free 00.1% (35) 00.0% N/A 00.1% (34)
> 00.3% (23) 00.2% (22) 00.1% (30) 00.1% (30)
> 21 0 2 4
> 6 5 4
> [36] CSRF 00.1% (37) 00.0% N/A 00.0% (35)
> 00.0% N/A 00.2% (28) 00.2% (29) 00.0% (33)
> 16 0 1 0
> 5 8 2
> [37] type-check 00.1% (36) 00.4% (28) 00.4% (25)
> 00.0% N/A 00.0% N/A 00.0% (36) 00.0% (35)
> 16 6 8 0
> 0 1 1
> -------------------------
> UNKNOWN/UNSPECIFIED ITEMS
> -------------------------
> n/a unk 09.0% N/A 07.9% N/A 07.1% N/A
> 07.0% N/A 08.2% N/A 08.9% N/A 11.5% N/A
> 1460 114 151 82
> 209 402 502
> n/a other 15.2% N/A 16.7% N/A 19.0% N/A
> 11.8% N/A 17.2% N/A 13.1% N/A 14.9% N/A
> 2468 239 407 139
> 435 595 653
> n/a not-specified 06.9% N/A 00.1% N/A 03.1% N/A
> 20.5% N/A 11.3% N/A 11.3% N/A 00.3% N/A
> 1121 2 66 240
> 286 513 14
>
>
>
> ===============================
> ===== Table 2: OS Vendors =====
> ===============================
>
>
> TOTAL 2001 2002
> 2003 2004 2005 2006
> (4418) ( 443) ( 660) (
> 527) ( 736) (1199) ( 853)
> ---------- ---------- ----------
> ---------- ---------- ---------- ----------
> [ 1] buf 20.0% ( 1) 21.0% ( 1) 26.8% ( 1)
> 24.9% ( 1) 20.4% ( 1) 16.2% ( 1) 16.1% ( 1)
> 882 93 177 131
> 150 194 137
> [ 2] link 04.0% ( 2) 07.4% ( 2) 03.3% ( 4)
> 04.0% ( 2) 05.2% ( 2) 04.0% ( 3) 01.8% ( 5)
> 177 33 22 21
> 38 48 15
> [ 3] dos-malform 03.7% ( 3) 05.6% ( 3) 06.1% ( 2)
> 02.7% ( 4) 04.5% ( 4) 01.8% ( 7) 03.3% ( 4)
> 162 25 40 14
> 33 22 28
> [ 4] XSS 03.4% ( 4) 01.6% (12) 04.4% ( 3)
> 03.0% ( 3) 01.4% ( 7) 04.2% ( 2) 04.7% ( 3)
> 152 7 29 16
> 10 50 40
> [ 5] int-overflow 02.7% ( 5) 00.0% N/A 01.2% (12)
> 02.3% ( 6) 04.6% ( 3) 02.1% ( 6) 04.7% ( 2)
> 119 0 8 12
> 34 25 40
> [ 6] format-string 02.4% ( 6) 05.2% ( 4) 01.5% (10)
> 02.3% ( 5) 02.6% ( 5) 02.4% ( 5) 01.6% ( 7)
> 107 23 10 12
> 19 29 14
> [ 7] priv 02.0% ( 7) 04.1% ( 5) 02.3% ( 6)
> 00.8% (13) 00.8% (14) 02.6% ( 4) 01.6% ( 6)
> 88 18 15 4
> 6 31 14
> [ 8] perm 01.8% ( 8) 04.1% ( 6) 02.1% ( 7)
> 01.1% (11) 01.1% (10) 01.7% ( 8) 01.4% ( 9)
> 78 18 14 6
> 8 20 12
> [ 9] dot 01.4% ( 9) 01.6% (13) 01.5% ( 9)
> 01.1% ( 8) 01.6% ( 6) 01.3% (12) 01.6% ( 8)
> 64 7 10 6
> 12 15 14
> [10] metachar 01.2% (10) 02.0% ( 9) 02.6% ( 5)
> 00.8% (16) 00.7% (17) 01.3% (11) 00.4% (19)
> 53 9 17 4
> 5 15 3
> [11] infoleak 01.2% (11) 00.9% (20) 01.2% (13)
> 01.1% ( 9) 01.1% ( 9) 01.3% (10) 01.2% (10)
> 52 4 8 6
> 8 16 10
> [12] race 01.0% (12) 01.1% (17) 00.9% (15)
> 00.4% (19) 01.0% (11) 01.6% ( 9) 00.7% (13)
> 45 5 6 2
> 7 19 6
> [13] memleak 00.8% (13) 02.0% (10) 00.6% (19)
> 00.8% (14) 01.0% (12) 00.9% (14) 00.2% (23)
> 37 9 4 4
> 7 11 2
> [14] sql-inject 00.8% (14) 00.2% (27) 00.6% (21)
> 01.1% (10) 00.7% (16) 00.9% (13) 00.9% (11)
> 35 1 4 6
> 5 11 8
> [15] crypt 00.8% (15) 01.6% (14) 01.4% (11)
> 01.1% ( 7) 00.4% (18) 00.4% (18) 00.5% (16)
> 34 7 9 6
> 3 5 4
> [16] sandbox 00.7% (16) 02.7% ( 7) 02.1% ( 8)
> 00.0% N/A 00.1% (23) 00.2% (28) 00.0% N/A
> 29 12 14 0
> 1 2 0
> [17] relpath 00.6% (18) 01.6% (11) 00.3% (28)
> 00.4% (18) 01.1% ( 8) 00.3% (27) 00.7% (14)
> 28 7 2 2
> 8 3 6
> [18] dos-flood 00.6% (17) 02.5% ( 8) 00.6% (20)
> 00.2% (22) 00.3% (20) 00.3% (25) 00.8% (12)
> 28 11 4 1
> 2 3 7
> [19] auth 00.5% (20) 01.4% (15) 01.1% (14)
> 00.6% (17) 00.3% (21) 00.3% (21) 00.2% (24)
> 24 6 7 3
> 2 4 2
> [20] signedness 00.5% (19) 00.2% (24) 00.9% (16)
> 00.9% (12) 00.4% (19) 00.6% (15) 00.2% (25)
> 24 1 6 5
> 3 7 2
> [21] pass 00.5% (21) 00.2% (25) 00.8% (17)
> 00.2% (20) 00.8% (15) 00.3% (24) 00.5% (15)
> 21 1 5 1
> 6 4 4
> [22] double-free 00.4% (22) 00.0% N/A 00.3% (29)
> 00.8% (15) 00.8% (13) 00.3% (20) 00.4% (18)
> 19 0 2 4
> 6 4 3
> [23] rand 00.3% (23) 01.4% (16) 00.5% (22)
> 00.2% (27) 00.1% (24) 00.0% N/A 00.2% (27)
> 13 6 3 1
> 1 0 2
> [24] crlf 00.2% (25) 00.0% N/A 00.5% (23)
> 00.2% (25) 00.0% N/A 00.4% (17) 00.2% (20)
> 11 0 3 1
> 0 5 2
> [25] spoof 00.2% (24) 00.2% (26) 00.3% (26)
> 00.0% N/A 00.0% N/A 00.3% (23) 00.5% (17)
> 11 1 2 0
> 0 4 4
> [26] form-field 00.2% (26) 00.5% (22) 00.3% (27)
> 00.2% (21) 00.0% N/A 00.4% (16) 00.0% N/A
> 10 2 2 1
> 0 5 0
> [27] default 00.2% (27) 00.2% (28) 00.5% (24)
> 00.0% N/A 00.1% (22) 00.3% (26) 00.2% (21)
> 10 1 3 0
> 1 3 2
> [28] type-check 00.2% (28) 00.7% (21) 00.6% (18)
> 00.0% N/A 00.0% N/A 00.1% (30) 00.0% N/A
> 8 3 4 0
> 0 1 0
> [29] CF 00.2% (29) 00.9% (18) 00.2% (31)
> 00.2% (26) 00.0% N/A 00.0% N/A 00.1% (29)
> 7 4 1 1
> 0 0 1
> [30] dos-release 00.2% (30) 00.9% (19) 00.3% (25)
> 00.2% (23) 00.0% N/A 00.0% N/A 00.0% N/A
> 7 4 2 1
> 0 0 0
> [31] php-include 00.1% (31) 00.0% N/A 00.0% N/A
> 00.0% N/A 00.0% N/A 00.3% (19) 00.2% (26)
> 6 0 0 0
> 0 4 2
> [32] eval-inject 00.1% (32) 00.0% N/A 00.0% N/A
> 00.0% N/A 00.0% N/A 00.3% (22) 00.2% (22)
> 6 0 0 0
> 0 4 2
> [33] design 00.1% (33) 00.2% (23) 00.3% (30)
> 00.2% (24) 00.0% N/A 00.1% (31) 00.0% N/A
> 5 1 2 1
> 0 1 0
> [34] webroot 00.0% (35) 00.0% N/A 00.0% N/A
> 00.0% N/A 00.0% N/A 00.0% N/A 00.1% (28)
> 1 0 0 0
> 0 0 1
> [35] upload 00.0% (36) 00.0% N/A 00.0% N/A
> 00.0% N/A 00.0% N/A 00.1% (32) 00.0% N/A
> 1 0 0 0
> 0 1 0
> [36] CSRF 00.0% (34) 00.0% N/A 00.0% N/A
> 00.0% N/A 00.0% N/A 00.1% (29) 00.0% N/A
> 1 0 0 0
> 0 1 0
> -------------------------
> UNKNOWN/UNSPECIFIED ITEMS
> -------------------------
> n/a unk 16.0% N/A 12.4% N/A 12.6% N/A
> 10.4% N/A 12.2% N/A 16.1% N/A 27.2% N/A
> 708 55 83 55
> 90 193 232
> n/a other 16.4% N/A 15.3% N/A 15.6% N/A
> 12.0% N/A 12.2% N/A 14.4% N/A 26.6% N/A
> 724 68 103 63
> 90 173 227
> n/a not-specified 14.3% N/A 00.2% N/A 05.9% N/A
> 26.0% N/A 24.6% N/A 22.2% N/A 00.8% N/A
> 631 1 39 137
> 181 266 7
>
>
>
>
> ==========================================
> ===== Table 3: OS Vendors vs. Others =====
> ==========================================
>
>
> TOTAL 2001 2002
> 2003 2004 2005 2006
> ---------- ---------- ----------
> ---------- ---------- ---------- ----------
> OS-ven 4418 443 660
> 527 736 1199 853
> Other 11774 991 1478
> 646 1798 3339 3522
> ---------- ---------- ----------
> ---------- ---------- ---------- ----------
> [ 1] XSS 03.4% ( 4) 01.6% (13) 04.4% ( 3)
> 03.0% ( 3) 01.4% ( 7) 04.2% ( 2) 04.7% ( 2)
> 152 7 29 16
> 10 50 40
> **** 17.8% ( 1) 02.5% ( 8) 10.7% ( 2)
> 11.1% ( 2) 14.8% ( 1) 20.2% ( 1) 25.5% ( 1)
> 2095 25 158 72
> 266 675 899
> [ 2] buf 20.0% ( 1) 21.0% ( 1) 26.8% ( 1)
> 24.9% ( 1) 20.4% ( 1) 16.2% ( 1) 16.1% ( 1)
> 882 93 177 131
> 150 194 137
> **** 10.8% ( 3) 18.8% ( 1) 17.3% ( 1)
> 20.6% ( 1) 13.4% ( 2) 07.5% ( 3) 05.9% ( 4)
> 1274 186 256 133
> 241 251 207
> [ 3] sql-inject 00.8% (14) 00.2% (27) 00.6% (19)
> 01.1% ( 8) 00.7% (16) 00.9% (13) 00.9% (11)
> 35 1 4 6
> 5 11 8
> **** 11.7% ( 2) 00.5% (26) 02.3% ( 8)
> 04.5% ( 3) 07.5% ( 3) 17.2% ( 2) 17.2% ( 2)
> 1381 5 34 29
> 135 573 605
> [ 4] dot 01.4% ( 9) 01.6% (14) 01.5% ( 9)
> 01.1% (10) 01.6% ( 6) 01.3% (11) 01.6% ( 8)
> 64 7 10 6
> 12 15 14
> **** 05.9% ( 4) 12.1% ( 2) 06.8% ( 3)
> 04.3% ( 4) 05.1% ( 4) 05.4% ( 4) 05.1% ( 5)
> 700 120 100 28
> 92 180 180
> [ 5] php-include 00.1% (32) 00.0% N/A 00.0% N/A
> 00.0% N/A 00.0% N/A 00.3% (19) 00.2% (27)
> 6 0 0 0
> 0 4 2
> **** 04.7% ( 5) 00.1% (30) 00.4% (22)
> 01.4% (11) 02.0% ( 8) 02.7% ( 6) 11.7% ( 3)
> 555 1 6 9
> 36 91 412
> [ 6] infoleak 01.2% (11) 00.9% (20) 01.2% (13)
> 01.1% (11) 01.1% ( 9) 01.3% (10) 01.2% (10)
> 52 4 8 6
> 8 16 10
> **** 04.1% ( 6) 03.3% ( 6) 05.5% ( 4)
> 03.7% ( 5) 04.8% ( 5) 04.8% ( 5) 03.0% ( 6)
> 488 33 81 24
> 87 159 104
> [ 7] dos-malform 03.7% ( 3) 05.6% ( 3) 06.1% ( 2)
> 02.7% ( 4) 04.5% ( 4) 01.8% ( 7) 03.3% ( 4)
> 162 25 40 14
> 33 22 28
> **** 02.6% ( 7) 04.4% ( 5) 04.7% ( 5)
> 02.3% ( 8) 03.0% ( 6) 01.8% ( 8) 01.6% ( 7)
> 301 44 70 15
> 54 60 58
> [ 8] link 04.0% ( 2) 07.4% ( 2) 03.3% ( 4)
> 04.0% ( 2) 05.2% ( 2) 04.0% ( 3) 01.8% ( 5)
> 177 33 22 21
> 38 48 15
> **** 01.3% (11) 03.1% ( 7) 01.6% (13)
> 03.1% ( 7) 01.9% ( 9) 01.2% (11) 00.1% (25)
> 152 31 23 20
> 34 39 5
> [ 9] format-string 02.4% ( 6) 05.2% ( 4) 01.5% (10)
> 02.3% ( 6) 02.6% ( 5) 02.4% ( 5) 01.6% ( 6)
> 107 23 10 12
> 19 29 14
> **** 01.6% ( 9) 02.3% ( 9) 02.0% (11)
> 03.1% ( 6) 02.3% ( 7) 01.4% ( 9) 00.8% (12)
> 189 23 29 20
> 42 47 28
> [10] crypt 00.8% (15) 01.6% (12) 01.4% (11)
> 01.1% ( 9) 00.4% (19) 00.4% (16) 00.5% (15)
> 34 7 9 6
> 3 5 4
> **** 01.9% ( 8) 04.8% ( 3) 03.3% ( 6)
> 01.9% ( 9) 01.1% (14) 01.9% ( 7) 01.0% (10)
> 227 48 49 12
> 19 63 36
> [11] priv 02.0% ( 7) 04.1% ( 5) 02.3% ( 6)
> 00.8% (16) 00.8% (13) 02.6% ( 4) 01.6% ( 7)
> 88 18 15 4
> 6 31 14
> **** 01.2% (12) 01.8% (12) 02.1% (10)
> 01.2% (14) 01.4% (11) 01.1% (12) 00.7% (13)
> 145 18 31 8
> 26 36 26
> [12] metachar 01.2% (10) 02.0% (10) 02.6% ( 5)
> 00.8% (15) 00.7% (17) 01.3% (12) 00.4% (19)
> 53 9 17 4
> 5 15 3
> **** 01.4% (10) 04.6% ( 4) 02.6% ( 7)
> 00.6% (20) 01.2% (13) 01.3% (10) 00.3% (21)
> 165 46 39 4
> 21 44 11
> [13] perm 01.8% ( 8) 04.1% ( 6) 02.1% ( 7)
> 01.1% ( 7) 01.1% (10) 01.7% ( 8) 01.4% ( 9)
> 78 18 14 6
> 8 20 12
> **** 01.2% (13) 02.1% (10) 01.7% (12)
> 01.4% (12) 00.9% (15) 00.8% (15) 01.1% ( 9)
> 137 21 25 9
> 16 28 38
> [14] int-overflow 02.7% ( 5) 00.0% N/A 01.2% (12)
> 02.3% ( 5) 04.6% ( 3) 02.1% ( 6) 04.7% ( 3)
> 119 0 8 12
> 34 25 40
> **** 00.3% (22) 00.1% (31) 00.0% N/A
> 00.6% (18) 00.7% (17) 00.3% (21) 00.3% (17)
> 41 1 0 4
> 13 11 12
> [15] dos-flood 00.6% (18) 02.5% ( 8) 00.6% (18)
> 00.2% (27) 00.3% (21) 00.3% (26) 00.8% (12)
> 28 11 4 1
> 2 3 7
> **** 00.9% (15) 01.8% (11) 02.2% ( 9)
> 00.8% (17) 01.6% (10) 00.2% (23) 00.3% (18)
> 103 18 32 5
> 29 7 12
> [16] pass 00.5% (21) 00.2% (25) 00.8% (17)
> 00.2% (26) 00.8% (15) 00.3% (20) 00.5% (17)
> 21 1 5 1
> 6 4 4
> **** 00.9% (14) 01.5% (16) 01.5% (14)
> 00.2% (27) 01.2% (12) 01.0% (14) 00.3% (16)
> 104 15 22 1
> 22 32 12
> [17] auth 00.5% (20) 01.4% (15) 01.1% (14)
> 00.6% (17) 00.3% (20) 00.3% (23) 00.2% (23)
> 24 6 7 3
> 2 4 2
> **** 00.8% (16) 01.6% (13) 01.4% (15)
> 00.5% (22) 00.8% (16) 00.5% (17) 00.8% (11)
> 100 16 20 3
> 15 17 29
> [18] webroot 00.0% (35) 00.0% N/A 00.0% N/A
> 00.0% N/A 00.0% N/A 00.0% N/A 00.1% (28)
> 1 0 0 0
> 0 0 1
> **** 00.7% (17) 00.2% (28) 00.3% (26)
> 00.5% (21) 00.3% (26) 01.0% (13) 01.1% ( 8)
> 87 2 5 3
> 5 33 39
> [19] form-field 00.2% (27) 00.5% (22) 00.3% (26)
> 00.2% (21) 00.0% N/A 00.4% (18) 00.0% N/A
> 10 2 2 1
> 0 5 0
> **** 00.6% (18) 00.8% (20) 01.0% (16)
> 00.8% (15) 00.3% (23) 00.4% (18) 00.7% (14)
> 71 8 15 5
> 6 14 23
> [20] relpath 00.6% (17) 01.6% (11) 00.3% (25)
> 00.4% (19) 01.1% ( 8) 00.3% (27) 00.7% (13)
> 28 7 2 2
> 8 3 6
> **** 00.4% (20) 00.5% (25) 00.3% (27)
> 01.2% (13) 00.3% (22) 00.4% (19) 00.2% (22)
> 43 5 4 8
> 6 12 8
> [21] race 01.0% (12) 01.1% (17) 00.9% (16)
> 00.4% (18) 01.0% (12) 01.6% ( 9) 00.7% (14)
> 45 5 6 2
> 7 19 6
> **** 00.2% (27) 00.2% (29) 00.1% (29)
> 00.8% (16) 00.2% (30) 00.2% (27) 00.1% (24)
> 24 2 2 5
> 3 7 5
> [22] memleak 00.8% (13) 02.0% ( 9) 00.6% (20)
> 00.8% (13) 01.0% (11) 00.9% (14) 00.2% (25)
> 37 9 4 4
> 7 11 2
> **** 00.2% (28) 00.7% (22) 00.1% (33)
> 00.2% (29) 00.3% (19) 00.1% (30) 00.1% (26)
> 24 7 1 1
> 6 4 5
> [23] msdos-device 00.0% N/A 00.0% N/A 00.0% N/A
> 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A
> 0 0 0 0
> 0 0 0
> **** 00.5% (19) 01.5% (15) 00.9% (17)
> 01.7% (10) 00.3% (21) 00.3% (22) 00.1% (31)
> 57 15 13 11
> 6 10 2
> [24] crlf 00.2% (24) 00.0% N/A 00.5% (23)
> 00.2% (25) 00.0% N/A 00.4% (17) 00.2% (24)
> 11 0 3 1
> 0 5 2
> **** 00.3% (23) 00.0% N/A 00.1% (34)
> 00.0% N/A 00.7% (18) 00.4% (20) 00.3% (19)
> 38 0 1 0
> 13 12 12
> [25] spoof 00.2% (25) 00.2% (28) 00.3% (29)
> 00.0% N/A 00.0% N/A 00.3% (21) 00.5% (16)
> 11 1 2 0
> 0 4 4
> **** 00.3% (25) 01.4% (17) 00.3% (25)
> 00.2% (28) 00.2% (29) 00.2% (25) 00.2% (23)
> 37 14 5 1
> 3 7 7
> [26] default 00.2% (26) 00.2% (26) 00.5% (24)
> 00.0% N/A 00.1% (22) 00.3% (25) 00.2% (26)
> 10 1 3 0
> 1 3 2
> **** 00.3% (24) 01.5% (14) 00.9% (18)
> 00.2% (26) 00.3% (27) 00.0% N/A 00.1% (29)
> 38 15 13 1
> 5 0 4
> [27] sandbox 00.7% (16) 02.7% ( 7) 02.1% ( 8)
> 00.0% N/A 00.1% (24) 00.2% (28) 00.0% N/A
> 29 12 14 0
> 1 2 0
> **** 00.1% (33) 00.5% (24) 00.5% (20)
> 00.0% N/A 00.2% (28) 00.0% N/A 00.0% N/A
> 17 5 8 0
> 4 0 0
> [28] rand 00.3% (23) 01.4% (16) 00.5% (22)
> 00.2% (23) 00.1% (23) 00.0% N/A 00.2% (22)
> 13 6 3 1
> 1 0 2
> **** 00.3% (26) 01.1% (18) 00.6% (19)
> 00.3% (23) 00.2% (32) 00.1% (32) 00.1% (28)
> 32 11 9 2
> 3 2 5
> [29] upload 00.0% (34) 00.0% N/A 00.0% N/A
> 00.0% N/A 00.0% N/A 00.1% (32) 00.0% N/A
> 1 0 0 0
> 0 1 0
> **** 00.4% (21) 00.0% N/A 00.1% (32)
> 00.2% (30) 00.3% (20) 00.6% (16) 00.4% (15)
> 42 0 1 1
> 6 21 13
> [30] signedness 00.5% (19) 00.2% (24) 00.9% (15)
> 00.9% (12) 00.4% (18) 00.6% (15) 00.2% (20)
> 24 1 6 5
> 3 7 2
> **** 00.1% (35) 00.0% N/A 00.1% (30)
> 00.6% (19) 00.2% (31) 00.1% (28) 00.0% N/A
> 14 0 2 4
> 3 5 0
> [31] dos-release 00.2% (29) 00.9% (19) 00.3% (30)
> 00.2% (20) 00.0% N/A 00.0% N/A 00.0% N/A
> 7 4 2 1
> 0 0 0
> **** 00.2% (29) 00.9% (19) 00.5% (21)
> 00.2% (25) 00.3% (25) 00.0% N/A 00.0% N/A
> 23 9 8 1
> 5 0 0
> [32] CF 00.2% (30) 00.9% (18) 00.2% (31)
> 00.2% (24) 00.0% N/A 00.0% N/A 00.1% (29)
> 7 4 1 1
> 0 0 1
> **** 00.2% (30) 00.6% (23) 00.4% (23)
> 00.2% (24) 00.0% N/A 00.1% (29) 00.1% (27)
> 22 6 6 1
> 0 4 5
> [33] eval-inject 00.1% (31) 00.0% N/A 00.0% N/A
> 00.0% N/A 00.0% N/A 00.3% (22) 00.2% (21)
> 6 0 0 0
> 0 4 2
> **** 00.2% (31) 00.0% N/A 00.0% N/A
> 00.0% N/A 00.1% (34) 00.2% (26) 00.3% (20)
> 19 0 0 0
> 1 7 11
> [34] design 00.1% (33) 00.2% (23) 00.3% (27)
> 00.2% (22) 00.0% N/A 00.1% (30) 00.0% N/A
> 5 1 2 1
> 0 1 0
> **** 00.2% (32) 00.7% (21) 00.4% (24)
> 00.0% N/A 00.1% (33) 00.1% (31) 00.1% (32)
> 18 7 6 0
> 1 2 2
> [35] double-free 00.4% (22) 00.0% N/A 00.3% (28)
> 00.8% (14) 00.8% (14) 00.3% (24) 00.4% (18)
> 19 0 2 4
> 6 4 3
> **** 00.0% (37) 00.0% N/A 00.0% N/A
> 00.0% N/A 00.0% N/A 00.0% (33) 00.0% (33)
> 2 0 0 0
> 0 1 1
> [36] type-check 00.2% (28) 00.7% (21) 00.6% (21)
> 00.0% N/A 00.0% N/A 00.1% (31) 00.0% N/A
> 8 3 4 0
> 0 1 0
> **** 00.1% (36) 00.3% (27) 00.3% (28)
> 00.0% N/A 00.0% N/A 00.0% N/A 00.0% (34)
> 8 3 4 0
> 0 0 1
> [37] CSRF 00.0% (36) 00.0% N/A 00.0% N/A
> 00.0% N/A 00.0% N/A 00.1% (29) 00.0% N/A
> 1 0 0 0
> 0 1 0
> **** 00.1% (34) 00.0% N/A 00.1% (31)
> 00.0% N/A 00.3% (24) 00.2% (24) 00.1% (30)
> 15 0 1 0
> 5 7 2
> -------------------------
> UNKNOWN/UNSPECIFIED ITEMS
> -------------------------
> n/a unk 16.0% N/A 12.4% N/A 12.6% N/A
> 10.4% N/A 12.2% N/A 16.1% N/A 27.2% N/A
> 708 55 83 55
> 90 193 232
> **** 06.4% N/A 06.0% N/A 04.6% N/A
> 04.2% N/A 06.6% N/A 06.3% N/A 07.7% N/A
> 752 59 68 27
> 119 209 270
> n/a other 16.4% N/A 15.3% N/A 15.6% N/A
> 12.0% N/A 12.2% N/A 14.4% N/A 26.6% N/A
> 724 68 103 63
> 90 173 227
> **** 14.8% N/A 17.3% N/A 20.6% N/A
> 11.8% N/A 19.2% N/A 12.6% N/A 12.1% N/A
> 1744 171 304 76
> 345 422 426
> n/a not-specified 14.3% N/A 00.2% N/A 05.9% N/A
> 26.0% N/A 24.6% N/A 22.2% N/A 00.8% N/A
> 631 1 39 137
> 181 266 7
> **** 04.2% N/A 00.1% N/A 01.8% N/A
> 15.9% N/A 05.8% N/A 07.4% N/A 00.2% N/A
> 490 1 27 103
> 105 247 7
>
>
>
> ==================================================
> ===== Table 4: Open and Closed Source (OS vendors)
> ==================================================
>
>
> TOTAL 2001 2002
> 2003 2004 2005 2006
> ---------- ---------- ----------
> ---------- ---------- ---------- ----------
> [ 1] buf 19.7% ( 1) 20.3% ( 1) 24.6% ( 1)
> 25.0% ( 1) 24.5% ( 1) 14.6% ( 1) 17.1% ( 1)
> **** 20.4% ( 1) 20.3% ( 1) 27.7% ( 1)
> 26.1% ( 1) 15.3% ( 1) 18.5% ( 1) 16.3% ( 1)
> [ 2] link 06.4% ( 2) 14.0% ( 2) 04.8% ( 3)
> 04.9% ( 2) 08.6% ( 2) 06.1% ( 2) 02.4% ( 5)
> **** 01.6% ( 6) 01.0% (17) 01.8% ( 9)
> 03.0% ( 2) 01.9% ( 5) 00.8% ( 7) 01.6% ( 6)
> [ 3] dos-malform 02.8% ( 5) 02.7% ( 7) 04.4% ( 4)
> 02.6% ( 6) 03.5% ( 5) 01.7% ( 8) 03.3% ( 4)
> **** 05.3% ( 2) 09.2% ( 2) 08.1% ( 2)
> 02.5% ( 3) 07.3% ( 2) 02.1% ( 3) 03.9% ( 3)
> [ 4] XSS 04.6% ( 3) 02.7% ( 8) 05.9% ( 2)
> 03.0% ( 5) 01.4% (10) 05.5% ( 3) 07.1% ( 2)
> **** 02.3% ( 3) 00.5% (22) 03.6% ( 4)
> 02.5% ( 4) 00.8% ( 8) 02.1% ( 4) 03.2% ( 4)
> [ 5] format-string 04.0% ( 4) 08.6% ( 3) 02.9% ( 6)
> 03.0% ( 4) 04.9% ( 3) 03.7% ( 4) 02.4% ( 6)
> **** 00.8% (16) 01.4% (13) 00.6% (17)
> 02.0% ( 5) 00.4% (18) 00.8% (10) 00.3% (17)
> [ 6] int-overflow 02.6% ( 6) 00.0% N/A 02.2% ( 7)
> 03.4% ( 3) 04.0% ( 4) 02.2% ( 7) 03.5% ( 3)
> **** 01.7% ( 5) 00.0% N/A 00.0% N/A
> 01.0% ( 7) 03.4% ( 3) 00.8% ( 8) 04.2% ( 2)
> [ 7] priv 02.3% ( 7) 05.4% ( 4) 01.8% ( 8)
> 01.5% (12) 01.2% (11) 02.3% ( 5) 02.2% ( 7)
> **** 01.8% ( 4) 01.9% ( 8) 03.0% ( 6)
> 00.0% N/A 00.4% (16) 03.4% ( 2) 00.8% (13)
> [ 8] perm 02.2% ( 8) 05.4% ( 5) 01.1% (13)
> 01.9% ( 8) 01.7% ( 7) 02.3% ( 6) 01.4% ( 9)
> **** 01.6% ( 7) 02.4% ( 6) 03.3% ( 5)
> 00.5% (11) 00.4% (12) 00.8% (12) 01.8% ( 5)
> [ 9] dot 01.5% (10) 00.5% (18) 01.8% ( 9)
> 01.1% (15) 02.0% ( 6) 01.4% (12) 01.6% ( 8)
> **** 01.2% (10) 01.9% (10) 00.9% (13)
> 01.0% ( 9) 01.5% ( 7) 00.5% (18) 01.6% ( 7)
> [10] infoleak 01.1% (13) 00.5% (19) 01.5% (12)
> 01.1% (13) 01.2% (12) 01.0% (14) 01.4% (10)
> **** 01.1% (13) 01.4% (12) 00.9% (12)
> 01.0% ( 8) 00.4% (17) 01.6% ( 5) 01.1% (10)
> [11] metachar 01.5% ( 9) 03.2% ( 6) 02.9% ( 5)
> 01.5% (11) 00.6% (15) 01.4% (11) 00.5% (15)
> **** 00.5% (18) 01.0% (18) 01.2% (11)
> 00.0% N/A 00.4% (14) 00.5% (15) 00.0% N/A
> [12] race 01.4% (11) 02.3% ( 9) 01.8% (10)
> 00.4% (19) 01.7% ( 8) 01.6% ( 9) 00.8% (13)
> **** 00.3% (24) 00.0% N/A 00.0% N/A
> 00.5% (10) 00.0% N/A 00.8% (14) 00.3% (21)
> [13] sql-inject 01.2% (12) 00.5% (21) 00.7% (18)
> 01.9% ( 9) 00.9% (13) 01.6% (10) 01.4% (11)
> **** 00.4% (19) 00.0% N/A 00.6% (18)
> 00.5% (20) 00.4% (13) 00.0% N/A 00.8% (14)
> [14] memleak 00.9% (14) 00.0% N/A 00.7% (16)
> 01.1% (14) 01.4% ( 9) 01.2% (13) 00.3% (24)
> **** 00.9% (15) 04.3% ( 4) 00.3% (19)
> 00.5% (12) 00.0% N/A 00.8% (13) 00.3% (19)
> [15] crypt 00.7% (16) 01.8% (11) 00.7% (15)
> 01.9% ( 7) 00.0% N/A 00.4% (18) 00.3% (21)
> **** 00.9% (14) 01.0% (16) 02.1% ( 7)
> 00.0% N/A 00.8% (11) 00.5% (16) 00.5% (15)
> [16] sandbox 00.2% (26) 00.5% (15) 00.0% N/A
> 00.0% N/A 00.3% (20) 00.3% (23) 00.0% N/A
> **** 01.4% ( 8) 05.3% ( 3) 04.2% ( 3)
> 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A
> [17] dos-flood 00.3% (21) 01.4% (12) 00.4% (24)
> 00.0% N/A 00.0% N/A 00.3% (24) 00.0% N/A
> **** 01.1% (11) 03.9% ( 5) 00.9% (14)
> 00.5% (14) 00.8% ( 9) 00.3% (19) 01.3% ( 8)
> [18] relpath 00.6% (17) 01.8% (10) 00.7% (17)
> 00.4% (18) 00.3% (16) 00.4% (19) 00.5% (18)
> **** 00.7% (17) 01.4% (14) 00.0% N/A
> 00.5% (13) 01.9% ( 6) 00.0% N/A 01.1% (12)
> [19] auth 00.1% (28) 00.5% (16) 00.0% N/A
> 00.0% N/A 00.3% (17) 00.0% N/A 00.3% (20)
> **** 01.2% ( 9) 02.4% ( 7) 02.1% ( 8)
> 01.5% ( 6) 00.4% (15) 01.0% ( 6) 00.3% (18)
> [20] pass 00.0% (32) 00.0% N/A 00.0% N/A
> 00.0% N/A 00.0% N/A 00.1% (28) 00.0% N/A
> **** 01.1% (12) 00.5% (20) 01.5% (10)
> 00.5% (16) 02.3% ( 4) 00.8% (11) 01.1% ( 9)
> [21] signedness 00.8% (15) 00.5% (17) 01.8% (11)
> 01.5% (10) 00.3% (19) 00.6% (17) 00.5% (16)
> **** 00.2% (29) 00.0% N/A 00.0% N/A
> 00.5% (17) 00.0% N/A 00.5% (17) 00.0% N/A
> [22] double-free 00.6% (18) 00.0% N/A 00.4% (22)
> 01.1% (16) 00.9% (14) 00.3% (25) 00.8% (12)
> **** 00.2% (28) 00.0% N/A 00.0% N/A
> 00.5% (19) 00.8% (10) 00.3% (21) 00.0% N/A
> [23] spoof 00.2% (23) 00.0% N/A 00.7% (20)
> 00.0% N/A 00.0% N/A 00.4% (21) 00.0% N/A
> **** 00.3% (22) 00.5% (23) 00.0% N/A
> 00.0% N/A 00.0% N/A 00.3% (20) 01.1% (11)
> [24] form-field 00.4% (20) 00.5% (20) 00.7% (19)
> 00.4% (20) 00.0% N/A 00.7% (16) 00.0% N/A
> **** 00.1% (31) 00.5% (21) 00.0% N/A
> 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A
> [25] crlf 00.5% (19) 00.0% N/A 01.1% (14)
> 00.0% N/A 00.0% N/A 00.7% (15) 00.5% (17)
> **** 00.0% N/A 00.0% N/A 00.0% N/A
> 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A
> [26] rand 00.2% (22) 00.9% (13) 00.4% (21)
> 00.4% (17) 00.0% N/A 00.0% N/A 00.3% (22)
> **** 00.3% (23) 01.9% ( 9) 00.3% (22)
> 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A
> [27] default 00.1% (29) 00.0% N/A 00.0% N/A
> 00.0% N/A 00.3% (18) 00.0% N/A 00.3% (23)
> **** 00.4% (20) 00.5% (24) 00.6% (16)
> 00.0% N/A 00.0% N/A 00.8% ( 9) 00.3% (16)
> [28] dos-release 00.1% (27) 00.5% (22) 00.4% (23)
> 00.4% (21) 00.0% N/A 00.0% N/A 00.0% N/A
> **** 00.2% (27) 01.4% (11) 00.3% (21)
> 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A
> [29] type-check 00.0% (34) 00.0% N/A 00.0% N/A
> 00.0% N/A 00.0% N/A 00.1% (26) 00.0% N/A
> **** 00.3% (21) 01.4% (15) 00.9% (15)
> 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A
> [30] CF 00.1% (30) 00.9% (14) 00.0% N/A
> 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A
> **** 00.2% (26) 01.0% (19) 00.0% N/A
> 00.5% (18) 00.0% N/A 00.0% N/A 00.3% (22)
> [31] eval-inject 00.2% (24) 00.0% N/A 00.0% N/A
> 00.0% N/A 00.0% N/A 00.4% (20) 00.5% (14)
> **** 00.0% N/A 00.0% N/A 00.0% N/A
> 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A
> [32] php-include 00.2% (25) 00.0% N/A 00.0% N/A
> 00.0% N/A 00.0% N/A 00.4% (22) 00.3% (19)
> **** 00.0% N/A 00.0% N/A 00.0% N/A
> 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A
> [33] design 00.0% N/A 00.0% N/A 00.0% N/A
> 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A
> **** 00.2% (25) 00.5% (25) 00.3% (20)
> 00.5% (15) 00.0% N/A 00.3% (22) 00.0% N/A
> [34] webroot 00.0% N/A 00.0% N/A 00.0% N/A
> 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A
> **** 00.1% (30) 00.0% N/A 00.0% N/A
> 00.0% N/A 00.0% N/A 00.0% N/A 00.3% (20)
> [35] upload 00.0% (33) 00.0% N/A 00.0% N/A
> 00.0% N/A 00.0% N/A 00.1% (29) 00.0% N/A
> **** 00.0% N/A 00.0% N/A 00.0% N/A
> 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A
> [36] CSRF 00.0% (31) 00.0% N/A 00.0% N/A
> 00.0% N/A 00.0% N/A 00.1% (27) 00.0% N/A
> **** 00.0% N/A 00.0% N/A 00.0% N/A
> 00.0% N/A 00.0% N/A 00.0% N/A 00.0% N/A
> -------------------------
> UNKNOWN/UNSPECIFIED ITEMS
> -------------------------
> n/a unk 09.7% N/A 12.2% N/A 10.3% N/A
> 04.5% N/A 07.8% N/A 11.5% N/A 10.1% N/A
> **** 25.7% N/A 13.0% N/A 15.7% N/A
> 20.1% N/A 23.0% N/A 26.9% N/A 45.0% N/A
> n/a other 19.3% N/A 13.1% N/A 20.6% N/A
> 15.7% N/A 10.4% N/A 15.9% N/A 39.4% N/A
> **** 12.4% N/A 18.8% N/A 12.7% N/A
> 05.0% N/A 14.9% N/A 10.7% N/A 12.4% N/A
> n/a not-specified 13.4% N/A 00.0% N/A 04.4% N/A
> 21.6% N/A 21.9% N/A 20.5% N/A 00.8% N/A
> **** 13.2% N/A 00.5% N/A 06.3% N/A
> 28.6% N/A 22.6% N/A 24.3% N/A 00.5% N/A
>
>
>
>