Common Weakness Enumeration

GPTKB entity

Statements (57)
Predicate Object
gptkbp:instanceOf software security project
classification entry
gptkbp:abbreviation gptkb:CWE
gptkbp:alternativeName Common_Weakness_Enumeration_entry
gptkbp:describes textual explanation of the weakness
gptkbp:example CWE-119 Buffer Overflow
CWE-20 Improper Input Validation
CWE-200 Information Exposure
CWE-352 Cross-Site Request Forgery
CWE-79 Cross-site Scripting
CWE-89 SQL Injection
example code or scenario
gptkbp:firstReleased 2006
gptkbp:focusesOn vulnerabilities
software weaknesses
gptkbp:goal improve software security
facilitate vulnerability management
standardize software weakness terminology
support security tools interoperability
gptkbp:hasChild lower-level CWE entry
gptkbp:hasComponent CWE Categories
CWE Identifiers
CWE List
CWE Views
https://www.w3.org/2000/01/rdf-schema#label Common Weakness Enumeration
gptkbp:language English
gptkbp:license public domain
gptkbp:maintainedBy gptkb:MITRE_Corporation
gptkbp:mitigatedBy recommended mitigation strategies
gptkbp:parent higher-level CWE entry
gptkbp:partOf gptkb:Common_Weakness_Enumeration
gptkbp:purpose categorize software weaknesses
gptkbp:recognizedBy CWE ID
gptkbp:referencedIn external documentation
gptkbp:relatedTo gptkb:OWASP_Top_Ten
gptkb:Common_Vulnerabilities_and_Exposures
gptkb:Common_Vulnerability_Scoring_System
related weaknesses
gptkbp:status active
deprecated
gptkbp:usedBy gptkb:government_agency
software developers
security professionals
security analysts
tool vendors
vulnerability databases
gptkbp:usedFor gptkb:security
software development
vulnerability management
gptkbp:usedIn vulnerability assessment
security training
software security tools
gptkbp:website https://cwe.mitre.org/
gptkbp:bfsParent gptkb:CWE-79
gptkb:CWE-352
gptkb:CVE_database
gptkbp:bfsLayer 6