Statements (57)
Predicate | Object |
---|---|
gptkbp:instanceOf |
software security project
classification entry |
gptkbp:abbreviation |
gptkb:CWE
|
gptkbp:alternativeName |
Common_Weakness_Enumeration_entry
|
gptkbp:describes |
textual explanation of the weakness
|
gptkbp:example |
CWE-119 Buffer Overflow
CWE-20 Improper Input Validation CWE-200 Information Exposure CWE-352 Cross-Site Request Forgery CWE-79 Cross-site Scripting CWE-89 SQL Injection example code or scenario |
gptkbp:firstReleased |
2006
|
gptkbp:focusesOn |
vulnerabilities
software weaknesses |
gptkbp:goal |
improve software security
facilitate vulnerability management standardize software weakness terminology support security tools interoperability |
gptkbp:hasChild |
lower-level CWE entry
|
gptkbp:hasComponent |
CWE Categories
CWE Identifiers CWE List CWE Views |
https://www.w3.org/2000/01/rdf-schema#label |
Common Weakness Enumeration
|
gptkbp:language |
English
|
gptkbp:license |
public domain
|
gptkbp:maintainedBy |
gptkb:MITRE_Corporation
|
gptkbp:mitigatedBy |
recommended mitigation strategies
|
gptkbp:parent |
higher-level CWE entry
|
gptkbp:partOf |
gptkb:Common_Weakness_Enumeration
|
gptkbp:purpose |
categorize software weaknesses
|
gptkbp:recognizedBy |
CWE ID
|
gptkbp:referencedIn |
external documentation
|
gptkbp:relatedTo |
gptkb:OWASP_Top_Ten
gptkb:Common_Vulnerabilities_and_Exposures gptkb:Common_Vulnerability_Scoring_System related weaknesses |
gptkbp:status |
active
deprecated |
gptkbp:usedBy |
gptkb:government_agency
software developers security professionals security analysts tool vendors vulnerability databases |
gptkbp:usedFor |
gptkb:security
software development vulnerability management |
gptkbp:usedIn |
vulnerability assessment
security training software security tools |
gptkbp:website |
https://cwe.mitre.org/
|
gptkbp:bfsParent |
gptkb:CWE-79
gptkb:CWE-352 gptkb:CVE_database |
gptkbp:bfsLayer |
6
|