"No one likes to share test results that show them writing bad code," said Paller.
Toward that end, the procurement language used by the State of New York and other state governments is being changed to ensure that these Top 25 errors are avoided. Other states are likely to follow.
Awareness of the Top 25 errors is also likely to be reflected in university computer science courses and in employers' evaluations of programmers.
The Top 25 list includes:
1) CWE-79 - Failure to Preserve Web Page Structure ('Cross-site Scripting')
2) CWE-89 - Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection')
3) CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
4) CWE-352 - Cross-Site Request Forgery (CSRF)
5) CWE-285 - Improper Access Control (Authorization)
6) CWE-807 - Reliance on Untrusted Inputs in a Security Decision
7) CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
8) CWE-434 - Unrestricted Upload of File with Dangerous Type
9) CWE-78 - Improper Sanitization of Special Elements used in an OS Command ('OS Command Injection')
10) CWE-311 - Missing Encryption of Sensitive Data
For further information, see MITRE.org's Web site.