You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: cwe/cwe/index.html
+4-4Lines changed: 4 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -1153,7 +1153,7 @@
1153
1153
1154
1154
1155
1155
<spanclass="md-ellipsis">
1156
-
CWE Abstraction
1156
+
CWE Relationships
1157
1157
</span>
1158
1158
1159
1159
@@ -1798,7 +1798,7 @@
1798
1798
<h1id="common-weakness-enumeration-cwe">Common Weakness Enumeration (<abbrtitle="CWE Common Weakness Enumeration">CWE</abbr>)<aclass="headerlink" href="#common-weakness-enumeration-cwe" title="Permanent link">¶</a></h1>
1799
1799
<divclass="admonition abstract">
1800
1800
<pclass="admonition-title">Overview</p>
1801
-
<p>The Common Weakness Enumeration (<abbrtitle="CWE Common Weakness Enumeration">CWE</abbr>) is a community-driven catalog of software and hardware weaknesses, maintained by MITRE. It serves as a standardized language and baseline for identifying, describing, and understanding common security flaws in software and hardware architecture, design, code, and implementation. </p>
1801
+
<p>The <ahref="https://cwe.mitre.org">Common Weakness Enumeration (<abbrtitle="CWE Common Weakness Enumeration">CWE</abbr>)</a> is a community-driven catalog of software and hardware weaknesses, maintained by MITRE. It serves as a standardized language and baseline for identifying, describing, and understanding common security flaws in software and hardware architecture, design, code, and implementation. </p>
1802
1802
<p>By providing a common taxonomy, <abbrtitle="CWE Common Weakness Enumeration">CWE</abbr> facilitates consistent security vulnerability reporting, enables better tool integration, and supports data-driven analysis of security trends. </p>
1803
1803
<p>Leveraging <abbrtitle="CWE Common Weakness Enumeration">CWE</abbr> is fundamental to shifting security left, allowing organizations to proactively address the root causes of vulnerabilities and build more secure systems.</p>
1804
1804
</div>
@@ -1913,13 +1913,13 @@ <h2 id="challenges-in-using-cwe">Challenges in Using <abbr title="CWE Common Wea
<h1id="cwe-abstraction"><abbrtitle="CWE Common Weakness Enumeration">CWE</abbr>Abstraction<aclass="headerlink" href="#cwe-abstraction" title="Permanent link">¶</a></h1>
1834
+
<h1id="cwe-relationships"><abbrtitle="CWE Common Weakness Enumeration">CWE</abbr>Relationships<aclass="headerlink" href="#cwe-relationships" title="Permanent link">¶</a></h1>
1817
1835
<divclass="admonition abstract">
1818
1836
<pclass="admonition-title">Overview</p>
1819
-
<p>MITRE's <abbrtitle="CWE Common Weakness Enumeration">CWE</abbr> framework categorizes weaknesses into four abstraction levels: <ahref="https://cwe.mitre.org/documents/glossary/index.html#Pillar%20Weakness">Pillar</a>, <ahref="https://cwe.mitre.org/documents/glossary/index.html#Class%20Weakness">Class</a>, <ahref="https://cwe.mitre.org/documents/glossary/index.html#Base%20Weakness">Base</a>, and <ahref="https://cwe.mitre.org/documents/glossary/index.html#Variant%20Weakness">Variant</a>:</p>
1837
+
<p>MITRE's <abbrtitle="CWE Common Weakness Enumeration">CWE</abbr> framework categorizes weaknesses into four abstraction levels: </p>
<li><ahref="https://cwe.mitre.org/documents/glossary/index.html#Class%20Weakness">Class</a>: Group related vulnerabilities around common behaviors.</li>
1841
+
<li><ahref="https://cwe.mitre.org/documents/glossary/index.html#Base%20Weakness">Base</a>: Specific weaknesses directly used in practical mappings.</li>
1842
+
<li><ahref="https://cwe.mitre.org/documents/glossary/index.html#Variant%20Weakness">Variant</a>: More specific instances of Base weaknesses (context-specific or subtle distinctions).</li>
1825
1843
</ul>
1826
1844
<p>Each level provides a different degree of specificity, aiding different practical purposes from research to vulnerability remediation.</p>
1827
1845
<p>Refer to the official schema: <ahref="https://cwe.mitre.org/documents/schema/#AbstractionEnumeration">AbstractionEnumeration</a>.</p>
<li><strong><abbrtitle="CWE Common Weakness Enumeration">CWE</abbr>-20:</strong> Improper Input Validation</li>
1858
-
<li><strong><abbrtitle="CWE Common Weakness Enumeration">CWE</abbr>-200:</strong> Exposure of Sensitive Information</li>
1875
+
<li><strong><ahref="https://cwe.mitre.org/data/definitions/20.html"><abbrtitle="CWE Common Weakness Enumeration">CWE</abbr>-20</a>:</strong> Improper Input Validation</li>
1876
+
<li><strong><ahref="https://cwe.mitre.org/data/definitions/200.html"><abbrtitle="CWE Common Weakness Enumeration">CWE</abbr>-200</a>:</strong> Exposure of Sensitive Information</li>
<li><strong><abbrtitle="CWE Common Weakness Enumeration">CWE</abbr>-599:</strong> Missing Validation of OpenSSL Certificate</li>
1890
-
<li><strong><abbrtitle="CWE Common Weakness Enumeration">CWE</abbr>-467:</strong> Use of <code>sizeof()</code> on a Pointer Type (C/C++)</li>
1907
+
<li><strong><ahref="https://cwe.mitre.org/data/definitions/599.html"><abbrtitle="CWE Common Weakness Enumeration">CWE</abbr>-599</a>:</strong> Missing Validation of OpenSSL Certificate</li>
1908
+
<li><strong><ahref="https://cwe.mitre.org/data/definitions/467.html"><abbrtitle="CWE Common Weakness Enumeration">CWE</abbr>-467</a>:</strong> Use of <code>sizeof()</code> on a Pointer Type (C/C++)</li>
<p><ahref="https://cwe.mitre.org/data/definitions/121.html"><abbrtitle="CWE Common Weakness Enumeration">CWE</abbr>-121 Stack-based Buffer Overflow </a> is not part of <abbrtitle="National Vulnerability Database">NVD</abbr> View (<ahref="https://cwe.mitre.org/data/definitions/1003.html">View-1003</a>).</p>
1978
-
<h2id="example-using-cwe-798-use-of-hard-coded-credential">Example using <ahref="https://cwe.mitre.org/data/definitions/798.html"><abbrtitle="CWE Common Weakness Enumeration">CWE</abbr>-798 Use of Hard-coded Credential </a><aclass="headerlink" href="#example-using-cwe-798-use-of-hard-coded-credential" title="Permanent link">¶</a></h2>
1979
-
<p><abbrtitle="CWE Common Weakness Enumeration">CWE</abbr>-798 is a child of three different nodes:</p>
1980
-
<ol>
1981
-
<li><abbrtitle="CWE Common Weakness Enumeration">CWE</abbr>-1391 (Use of Weak Credentials) under Pillar <abbrtitle="CWE Common Weakness Enumeration">CWE</abbr>-284: Improper Access Control</li>
1982
-
<li><abbrtitle="CWE Common Weakness Enumeration">CWE</abbr>-671 (Lack of Administrator Control over Security) under Pillar <abbrtitle="CWE Common Weakness Enumeration">CWE</abbr>-710: Improper Adherence to Coding Standards</li>
1983
-
<li><abbrtitle="CWE Common Weakness Enumeration">CWE</abbr>-344 (Use of Invariant Value in Changing Context) under Pillar <abbrtitle="CWE Common Weakness Enumeration">CWE</abbr>-693: Protection Mechanism Failure</li>
1984
-
</ol>
1985
1960
1986
1961
1987
1962
@@ -2013,7 +1988,7 @@ <h2 id="example-using-cwe-798-use-of-hard-coded-credential">Example using <a hre
0 commit comments