Home News HackerOne’s Top 10 security vulnerabilities

HackerOne’s Top 10 security vulnerabilities

85
0

Hackers earn thousands from the most common security vulnerabilities

Today, HackerOne releases never before seen research on the top 10 most impactful security vulnerabilities reported through its programs – those that have earned hackers on the platform more than US$54 million in bounties.

Based on data from more than 120,000 security vulnerabilities reported across more than 1,400 customer programs globally, HackerOne has launched an interactive site showing vulnerability types with the highest severity scores, the largest total report volumes and the most reported by industry.

“Customers are speaking in one voice through this Forrester study,” said Marten Mickos, CEO of HackerOne. “Hacker-powered pen tests give the best bang for the buck, and the underlying time, security, development and compliance benefits are even stronger. The power of a community of over 400,000 hackers is unsurpassed.”

HackerOne’s Top 10 security vulnerabilities are:

01. Cross-site Scripting – All Types (dom, reflected, stored, generic)
02. Improper Authentication – Generic
03. Information Disclosure
04. Privilege Escalation
05. SQL Injection
06. Code Injection
07. Server-Side Request Forgery (SSRF)
08. Insecure Direct Object Reference (IDOR)
09. Improper Access Control – Generic
10. Cross-Site Request Forgery (CSRF)

“We see a 40% crossover of the HackerOne Top 10 to the latest version of the OWASP Top 10. Cross-site Scripting (XSS), Information Disclosure, and Injection are all included on both lists. Both assets will be able to help security teams identify the top risks, our just also takes into account volume and bounty values, which we think will be of particular interest to security teams looking to protect against criminal hackers,” Miju Han, Director of Product Management, HackerOne. “Looking at the cumulative amount of bounties paid for critical and high severity bugs, the total is over 60% of all bounties paid. Interestingly, comparing by volume of reports, there were nearly three times as many high severity bugs reported as critical severity. At the opposite end, low severity reports accounted for just 8% of the bounty total, yet made up nearly 30% of the reported volume. We are fortunate to have such a comprehensive data set that allows us to share with our customers and the industry which vulnerabilities are likely to be the most expensive.”

LEAVE A REPLY

Please enter your comment!
Please enter your name here

33 − = 23