Compliance reports
The Compliance reports section includes the following reports:
CWE Top 10 KEV report
CWE Top 25 report
OWASP Top 10 report
PCI-DSS v4.0.1 report
CWE Top 10 KEV report
The CWE Top 10 KEV Weaknesses list identifies the top ten CWEs in the Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities (KEV) Catalog, a database of security flaws in software applications and weaknesses that have been exposed and leveraged by attackers.
The report is based on the version released in 2023 by Mitre. The supported products are Snyk Open Source, Snyk Container, and Snyk Code.
CWE Top 25 report
The CWE Top 25 Most Dangerous Software Weaknesses is a list that demonstrates the current most common and impactful software weaknesses based on Common Vulnerabilities and Exposures (CVEs) severity and their exploitation potential.
The report is based on the latest version released in 2023 by Mitre. The supported products are Snyk Open Source, Snyk Container, and Snyk Code.
OWASP Top 10 report
The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks for web applications and is globally recognized by developers as the first step towards more secure coding.
Each control in the list (A1, A2, and so on) is based on a list of Common Weakness Enumerations (CWEs). For example, A01:2025 – Broken Access Control is based on a list of 34 CWEs.
The CWEs are mapped to Snyk-IDs (), which are mapped to issues.
For example, the critical vulnerability SNYK-JAVA-ORGAPACHELOGGINGLOG4J-2314720 is classified as CWE-94, which is part of the OWASP TOP 10 A03:2025 - Injection. All the issues related to this vulnerability will be under the A03 category.
Learn more by using the OWASP TOP 10 Learning path on Snyk Learn.
The report is based on the latest mapping released in 2021. The supported products are Snyk Open Source, Snyk Container, and Snyk Code.
PCI-DSS v4.0.1 report
Release status
The PCI-DSS v4.0.1 report is in Early Access and available only with Enterprise plans.
PCI Security Standards are technical and operational requirements created by the PCI Security Standards Council (PCI SSC) to safeguard cardholder data. These standards apply to all entities that store, process, or transmit this information and include requirements for software developers and manufacturers. The Council manages these standards, while compliance is enforced by founding members: American Express, Discover Financial Services, JCB, MasterCard, and Visa Inc.
Snyk PCI-DSS v4.0.1 Report is designed to help you:
Estimate readiness for meeting the PCI-DSS AppSec requirements for SCA and SAST based on the Snyk scan results.
Provide evidence that the Organization is meeting the PCI-DSS AppSec requirements for SCA and SAST vulnerabilities.
Prioritize issues to improve PCI-DSS compliance readiness.
The report identifies PCI-DSS risks and violations based on the following PCI-DSS v4.0.1 requirements:
Requirement 6.2.4: Engineers use various techniques to prevent or mitigate common software attacks and related vulnerabilities in bespoke and custom software. This includes but is not limited to the following methods:
Injection attacks, including SQL, LDAP, XPath, or other command, parameter, object, fault, or injection-type flaws.
Attacks on data and data structures, including attempts to manipulate buffers, pointers, input data, or shared data.
Attacks on cryptography usage, including attempts to exploit weak, insecure, or inappropriate cryptographic implementations, algorithms, cipher suites, or modes of operation.
Attacks on business logic, including attempts to abuse or bypass application features and functionalities through the manipulation of APIs, communication protocols and channels, client-side functionality, or other system or application functions and resources. This includes cross-site scripting (XSS) and cross-site request forgery (CSRF).
Attacks on access control mechanisms, including attempts to bypass or abuse identification, authentication, or authorization mechanisms or attempts to exploit weaknesses in the implementation of such mechanisms.
Attacks using any “high-risk” vulnerabilities identified in the vulnerability identification process, as defined in Requirement 6.3.1.
Requirement 6.3.3: All system components are protected from known vulnerabilities by installing applicable security patches and updates as follows:
Patches and updates for critical vulnerabilities, identified according to the risk ranking process at Requirement 6.3.1 are installed within one month of release.
Snyk Violation Analysis based on PCI-DSS attack categories
As the standard does not explicitly define specific CWEs or CVEs, Snyk provides an analysis based on leading CWEs associated with the named attack categories. Below are the CWEs categorized by attack type:
Injection Attack Violations Summary
The following list provides an association between the identified attack categories and the CWEs associated with each category:
SQL Injection: CWE-89
LDAP Injection: CWE-90
XML Injection (XPath Injection): CWE-91
Command Injection: CWE-77
Use of Unsafe Reflection: CWE-470
Attacks on Data and Data Structures Violations Summary
The following list provides an association between the identified attack categories and the CWEs associated with each category:
Buffer Overflow: CWE-120
NULL Pointer Dereference: CWE-476
Double Free: CWE-415
Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’): CWE-362
Attacks on Cryptography Usage Violations Summary
The following list provides an association between the identified attack categories and the CWEs associated with each category:
Use of a Broken or Risky Cryptographic Algorithm: CWE-327
Use of Insufficiently Random Values: CWE-330
Improper Verification of Cryptographic Signature: CWE-347
Cleartext Transmission of Sensitive Information: CWE-319
Use of Hard-coded Cryptographic Key: CWE-321
Attacks on Business Logic Violations Summary
The following list provides an association between the identified attack categories and the CWEs associated with each category:
Server-Side Request Forgery (SSRF): CWE-918
Cross-Site Request Forgery (CSRF): CWE-352
Cross-Site Scripting (XSS): CWE-79
Origin Validation Error: CWE-346
Improper Authorization: CWE-285
Exposure of Sensitive Information to an Unauthorized Actor: CWE-200
Attacks on Access Control Mechanisms Violations Summary
The following list provides an association between the identified attack categories and the CWEs associated with each category:
Improper Authentication: CWE-287
Improper Access Control: CWE-284
Incorrect Authorization: CWE-863
Authorization Bypass Through User-Controlled Key: CWE-639
Missing Authentication for Critical Function: CWE-306
Incorrect Implementation of Authentication Algorithm: CWE-303
Attacks on Access Control Mechanisms Violations Summary
The Missing Authorization attack category is associated with CWE-862.
PCI-DSS v4.0.1 Guidance
The report is filtered by default on open issues of critical severity. Those filters are also applicable when exporting the report to PDF.
PCI-DSS Readiness Trend
The PCI-DSS Readiness Trend is designed to help you track your progress toward eliminating PCI-DSS violations. A violation is defined as a critical vulnerability elected by the PCI-DSS attack categories (as explained in Requirement 6.2.4) that is more than 30 days old, as stated in Requirement 6.3.3.
The number on the left indicates the violation status and the progress made in the last seven days.
The trend shows all vulnerabilities per Requirement 6.2.4, categorized by age bucket. This allows for quick identification of potential violations and vulnerabilities that may soon become violations.
Attack category breakdown
The breakdown table helps identify the number of vulnerabilities by attack category (as per requirement 6.2.4) or by Snyk Organization based on the relevant age bucket.
Use the table to pinpoint major attack categories or Snyk Organizations that lead to PCI-DSS violations. You can click on the figures to explore the specific issues in more detail.
After you investigate and see the actual issues behind the figures, you may proceed by:
Vulnerability triage and prioritization.
Conclude the prevalent CWEs and CVEs by sorting on the CWE/CVE column and filtering those CWEs/CVEs in the Vulnerabilities Detail Report to surface all the vulnerability occurrences across targets and Projects.
Run a vulnerability eradication campaign or assign Snyk Learn training to relevant engineering teams.
Last updated
Was this helpful?

