Vulnerability Mapping Notes
Rationale : This entry is a View. Views are not weaknesses and therefore inappropriate to describe the root causes of vulnerabilities.
Comments : Use this View or other Views to search and navigate for the appropriate weakness.
Audience
Stakeholder |
Description |
Software Developers |
By following the CWE Top 25, developers are able to significantly reduce the number of weaknesses that occur in their software. |
Product Customers |
Customers can use the weaknesses in this view in order to formulate independent evidence of a claim by a product vendor to have eliminated / mitigated the most dangerous weaknesses. |
Educators |
Educators can use this view to focus curriculum and teachings on the most dangerous weaknesses. |
Submission
Name |
Organization |
Date |
Date Release |
Version |
CWE Content Team |
MITRE |
2022-06-22 +00:00 |
2022-06-28 +00:00 |
4.8 |
Modifications
Name |
Organization |
Date |
Comment |
CWE Content Team |
MITRE |
2023-06-29 +00:00 |
updated Mapping_Notes |
References
REF-1268
2022 CWE Top 25 Most Dangerous Software Weaknesses
http://cwe.mitre.org/top25/archive/2022/2022_cwe_top25.html