Notes de cartographie des vulnérabilités
Justification : This entry is a View. Views are not weaknesses and therefore inappropriate to describe the root causes of vulnerabilities.
Commentaire : Use this View or other Views to search and navigate for the appropriate weakness.
Audience
Partie prenante |
Description |
Software Developers |
By following the CWE Top 25, developers are able to significantly reduce the number of weaknesses that occur in their software. |
Product Customers |
Customers can use the weaknesses in this view in order to formulate independent evidence of a claim by a product vendor to have eliminated / mitigated the most dangerous weaknesses. |
Educators |
Educators can use this view to focus curriculum and teachings on the most dangerous weaknesses. |
Soumission
Nom |
Organisation |
Date |
Date de publication |
Version |
CWE Content Team |
MITRE |
2023-06-26 +00:00 |
2023-06-29 +00:00 |
4.12 |
Modifications
Nom |
Organisation |
Date |
Commentaire |
CWE Content Team |
MITRE |
2024-11-19 +00:00 |
updated References |
Références
REF-1344
2023 CWE Top 25 Most Dangerous Software Weaknesses
https://cwe.mitre.org/top25/archive/2023/2023_cwe_top25.html