Notes de cartographie des vulnérabilités
Justification : This entry is a Category. Using categories for mapping has been discouraged since 2019. Categories are informal organizational groupings of weaknesses that can help CWE users with data aggregation, navigation, and browsing. However, they are not weaknesses in themselves.
Commentaire : Consider mapping to weaknesses that are members of this Category.
Soumission
Nom |
Organisation |
Date |
Date de publication |
Version |
PLOVER |
|
2006-07-19 +00:00 |
2006-07-19 +00:00 |
Draft 3 |
Modifications
Nom |
Organisation |
Date |
Commentaire |
CWE Content Team |
MITRE |
2008-09-08 +00:00 |
updated Relationships, Taxonomy_Mappings |
CWE Content Team |
MITRE |
2009-01-12 +00:00 |
updated Relationships |
CWE Content Team |
MITRE |
2012-05-11 +00:00 |
updated References |
CWE Content Team |
MITRE |
2014-07-30 +00:00 |
updated Detection_Factors |
CWE Content Team |
MITRE |
2017-11-08 +00:00 |
updated Affected_Resources, Detection_Factors, Functional_Areas, Related_Attack_Patterns, Relationships |
CWE Content Team |
MITRE |
2018-03-27 +00:00 |
updated Relationships |
CWE Content Team |
MITRE |
2020-02-24 +00:00 |
updated Relationships, Terminology_Notes |
CWE Content Team |
MITRE |
2021-10-28 +00:00 |
updated Relationships |
CWE Content Team |
MITRE |
2023-01-31 +00:00 |
updated Terminology_Notes |
CWE Content Team |
MITRE |
2023-06-29 +00:00 |
updated Mapping_Notes |
Références
REF-44
24 Deadly Sins of Software Security
Michael Howard, David LeBlanc, John Viega.