Fact-checked by Grok 2 weeks ago
References
-
[1]
About CWE - Common Weakness Enumeration - MITRE CorporationMar 22, 2024 · Common Weakness Enumeration (CWE™) is a community-developed list of common software and hardware weaknesses. A “weakness” is a condition in a ...
-
[2]
About - CWE HistorySep 27, 2022 · MITRE began with CVE in 1999, then created PLOVER in 2005, and the first CWE list in 2006. Hardware support was added in 2020.
-
[3]
CWE List Version 4.18Nov 19, 2024 · The Common Weakness Enumeration (CWE) is a list of software and hardware weaknesses types, created by a community initiative.Downloads · Archive · CWE-388 · CWE-1
-
[4]
CWE Top 25 Most Dangerous Software WeaknessesFeb 10, 2025 · Welcome to the 2024 Common Weakness Enumeration (CWE™) Top 25 Most Dangerous Software Weaknesses list (CWE™ Top 25).2024 Top 25 List · Archive · Top 10 KEV Weaknesses · Key Insights
-
[5]
CWE - Frequently Asked Questions (FAQ) - MITRE CorporationMar 22, 2024 · CWE is sponsored by the office of the U.S. Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA).
-
[6]
CWE - News & Events - 2025 - The MITRE CorporationCWE Version 4.17 has been posted on the CWE List page to add 3 new weaknesses and make usability improvements to 20 additional weakness entry pages, among other ...
-
[7]
NVD CWE Slice - National Institute of Standards and TechnologyThe Common Weakness Enumeration Specification (CWE) provides a common language of discourse for discussing, finding and dealing with the causes of software ...
-
[8]
CWE - Process - MITRE CorporationApr 29, 2019 · Common Weakness Enumeration. A community-developed list of SW & HW weaknesses that can become vulnerabilities. New to CWE? click here! CWE ...
- [9]
-
[10]
CWE Glossary - MITRE CorporationJul 7, 2024 · More general than a Variant weakness, but more specific than a Class Weakness. Base level weaknesses typically describe issues in terms of 2 or ...Base Weakness · Chain · Class Weakness · Composite
-
[11]
CWE-20: Improper Input Validation (4.18) - MITRE CorporationInput validation is a frequently-used technique for checking potentially dangerous inputs in order to ensure that the inputs are safe for processing within the ...
-
[12]
Schema Documentation - Schema Version 7.2 - CWESep 9, 2025 · Common Weakness Enumeration. A community-developed list of SW & HW weaknesses that can become vulnerabilities. New to CWE? click here! CWE ...
-
[13]
CVE → CWE "Root Cause Mapping" Guidance - MITRE CorporationMar 22, 2024 · A CWE “View” is a collection of weaknesses organized for a specific purpose or targeted at a specific audience. Most Views are a subset of the ...
- [14]
-
[15]
CWE-1000: Research Concepts (4.18)A variant is a weakness that is described at a very low level of detail, typically limited to a specific language or technology. A chain is a set of weaknesses ...
-
[16]
CWE-658: Weaknesses in Software Written in C (4.18)Variant - a weakness that is linked to a certain type of product, typically involving a specific language or technology.
-
[17]
CWE-700: Seven Pernicious Kingdoms (4.18) - MITRE CorporationThis view (graph) organizes weaknesses using a hierarchical structure that is similar to that used by Seven Pernicious Kingdoms.
-
[18]
CWE-Compatible Products and ServicesThe products and services listed below have achieved the final stage of the CWE Compatibility Program and are now "Officially CWE-Compatible."
-
[19]
SonarQube Security: code vulnerability detection - Qim infoJun 17, 2025 · SonarQube is a static code analysis tool that detects vulnerabilities, bugs, and bad practices, including injections, XSS, and authentication ...
-
[20]
Top 5 Best Static Code Analysis Tools of 2023 - Tech TimesMar 26, 2023 · Coverity is a fast and accurate static code analysis tool from Synopsys. This powerful tool enables you to detect and address vulnerabilities ...
-
[21]
Dynamic Application Security Testing (DAST)May 8, 2025 · Dynamic Application Security Testing Report · Vulnerability Summary (OWASP/CWE mapped) · Screenshots and Proof-of-Concepts (PoCs) · Authentication ...
-
[22]
What Are Secure Coding Standards? CERT, OWASP, and ... - KiuwanMay 6, 2024 · Learn about secure coding standards, why they matter and how to implement frameworks like OWASP, CERT, and NIST into your SDLC.
-
[23]
Leveraging CWEs in Secure Code TrainingFeb 25, 2025 · CWEs are a list of common software weaknesses. Training can be customized to address specific CWEs, using features like enhanced search and ...
-
[24]
[PDF] DevSecOps Best Practices Guide - mitre safJun 1, 2023 · • Secure coding to avoid defects based on the following standards: – Common Weakness Enumeration (CWE)/SANS Top 25 Most Dangerous Software.
-
[25]
Harnessing Static and Dynamic Code Scanning in DevSecOpsFeb 12, 2024 · CWE is a community project with the goal of understanding flaws in hardware and software and creating tools that can be used to identify, fix, ...
-
[26]
CWE - Common Weakness Scoring System (CWSS)After the release of CWSS 1.0, the schedule for future development is uncertain. ... Date, Document Version, Notes. September 5, 2014, 1.0.1. Changed 4.2 example ...
-
[27]
CWE-635: Weaknesses Originally Used by NVD from 2008 to 2016 ...CWE nodes in this view (slice) were used by NIST to categorize vulnerabilities within NVD, from 2008 to 2016. This original version has been used by many other ...
-
[28]
New to CAPEC? - MITRE CorporationNotice that the mapping between CAPEC entries and CWE weaknesses is not necessarily a one-to-one relationship. The attack pattern could need to exploit all the ...
-
[29]
CWE-200: Exposure of Sensitive Information to an Unauthorized ActorThe product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
-
[30]
CWE-1344: Weaknesses in OWASP Top Ten (2021) (4.18)This view outlines the most important issues as identified by the OWASP Top Ten (2021 version), providing a good starting point for web application developers ...
-
[31]
CWE Compatibility ProgramJun 6, 2023 · NOTICE: As of 4/16/2024, the CWE Compatibility Program has been discontinued. The product listings included in this section have been moved ...
-
[32]
CWE - Industry News Coverage - 2008 Archive - MitreCWE was the main topic of a March 18, 2008 article entitled "GrammaTech Announces First Fully Compatible Static-Analysis Tool for MITRE's Common Weakness ...
-
[33]
Requirements and Recommendations for CWE Compatibility and ...Jan 4, 2017 · Document version: 1.0 Date: July 28, 2011. This is a draft report and does not represent an official position of The MITRE Corporation.
-
[34]
X.1524 : Common weakness enumeration - ITUX.1524 : Common weakness enumeration ; Recommendation X.1524 (03/12). Approved in 2012-03-02. Status : In force. Table of Contents.Missing: CWE Compatibility Program revised
-
[35]
Requirements and Recommendations for CWE CompatibilityMay 24, 2023 · NOTICE: As of 4/16/2024, the CWE Compatibility Program has been discontinued. The product listings included in this section have been moved ...
-
[36]
CWE - Organizations Participating - MITRE CorporationThe CWE Compatibility Program has 87 participating organizations and 148 products/services, but it has been discontinued.
-
[37]
[PDF] 1 of 10 Being Explicit about Security Weaknesses Robert A. Martin ...be included in the TRDs to help identify the false positive effectiveness of the tools. ... This “CWE Compatibility and CWE Effectiveness” program is similar to ...Missing: criteria | Show results with:criteria
- [38]
- [39]
-
[40]
CWE-119: Improper Restriction of Operations within the Bounds of a ...This table specifies different individual consequences associated with the weakness. The Scope identifies the application security area that is violated.Missing: Heartbleed | Show results with:Heartbleed
-
[41]
CWE-287: Improper Authentication (4.18)Weaknesses Originally Used by NVD from 2008 to 2016. MemberOf, Category - a CWE entry that contains a set of other entries that share a common ...Missing: integration | Show results with:integration
-
[42]
Equifax Data Breach Settlement - Federal Trade CommissionThe settlement includes up to $425 million to help people affected by the data breach. The deadline to file a claim was January 22, 2024.Missing: CWE- 200
- [43]
- [44]
-
[45]
OpenSSL 'Heartbleed' vulnerability (CVE-2014-0160) | CISAOct 5, 2016 · A vulnerability in OpenSSL could allow a remote attacker to expose sensitive data, possibly including user authentication credentials and secret keys.
-
[46]
ED 21-01: Mitigate SolarWinds Orion Code Compromise | CISADec 13, 2020 · On December 13, 2020, CISA issued ED 21-01 to mitigate the SolarWinds Orion code compromise. As noted in ED 21-01, CISA continues to work with ...
-
[47]
CWE-829: Inclusion of Functionality from Untrusted Control SphereThe product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.Missing: SolarWinds | Show results with:SolarWinds
-
[48]
A08 Software and Data Integrity Failures - OWASP Top 10:2025 RC1Notable Common Weakness Enumerations (CWEs) include CWE-829: Inclusion of Functionality from Untrusted Control Sphere, CWE-494: Download of Code Without ...
-
[49]
Preventing the Next Equifax – All CVEs Have Root Causes in CWEsJan 24, 2018 · The Equifax data breach in 2017 was the result of attackers exploiting an unpatched vulnerability in Equifax software.Missing: 200 | Show results with:200
-
[50]
Raising Awareness of Hardware Security Weaknesses: Intel Research and...### Summary of Hardware Weaknesses in CWE
-
[51]
Toward a Quantum Information System Cybersecurity Taxonomy ...Apr 18, 2024 · ... Common Weakness Enumeration (CWE) framework [23] . Report issue for preceding element. The CWE framework includes a large number of hardware ...
-
[52]
[PDF] They Know Your Weaknesses – Do You?: - GitHub PagesCommon Weakness Enumeration (CWE) [1] is a collection of software weakness descriptions that offers a way to iden- tify and eliminate vulnerabilities in ...
-
[53]
[PDF] Fixing Invalid CVE-CWE Mappings in Threat DatabasesAbstract—Accurate root cause analysis plays a key role for developing mitigation strategies and understanding attack paths.
-
[54]
CWE Community WGs & SIGs - MITRE CorporationJul 30, 2025 · Hardware CWE Special Interest Group (HW CWE SIG). The HW CWE SIG offers a forum for researchers and representatives from organizations ...
- [55]
-
[56]
CWE Most Important Hardware WeaknessesAug 19, 2025 · The decision to update the CWE Most Important Hardware Weaknesses List was driven by significant changes in the hardware security landscape and ...
- [57]
-
[58]
2024 CWE Top 25 Most Dangerous Software WeaknessesNov 20, 2024 · Common Weakness Enumeration (CWE) is a list of software and hardware weaknesses.