CWE REST API Now AvailableThe CWE™ Program is pleased to announce that the “CWE REST API” is now available. We thank the REST API Working Group for their…Aug 8Aug 8
CWE Program Embarks on Improving UsabilityIn a significant step towards enhancing usability, the Common Weakness Enumeration (CWE™) Program, in collaboration with the CWE User…Jul 18Jul 18
Major Usability Improvements to Viewing CWE Content UnderwayThe Common Weakness Enumeration (CWE™) Program is currently in the process of making changes to the presentation of CWE entries and have…Jun 10Jun 10
Out-of-Bounds Read Podcast — “Red Hat’s CWE Journey”“Out-Of-Bounds Read” is the Common Weakness Enumeration (CWE™) Program’s free podcast about common weaknesses in software and hardware…Jan 23Jan 23
“2023 CWE Top 25 Most Dangerous Software Weaknesses” List Now AvailableThe “2023 Common Weakness Enumeration (CWE) Top 25 Most Dangerous Software Weaknesses” (CWE Top 25) list was released on June 21, 2023, on…Jul 7, 2023Jul 7, 2023
Community Actively Working to Enhance CWE’s ICS/OT CoverageWork related to describing and classifying security weaknesses in information technology (IT) through efforts such as Common Weakness…Nov 30, 2022Nov 30, 2022
How to Effectively Utilize Hardware CWEs Across your OrganizationHow to Effectively Utilize Hardware CWEs Across your OrganizationMay 13, 2022May 13, 2022
The Missing Piece in Vulnerability ManagementThe CWE/CAPEC Program partners with organizations around the world to further the program’s mission and objectives. The views and opinions…May 4, 2022May 4, 2022
New CWE Entry, CWE-FFFF: Use of a Potentially Dangerous Electronic Programmable Machine to…On the CWE team, we know that identifying the root cause weakness of a vulnerability is not always a straight-forward and easy task. We…Apr 1, 2022Apr 1, 2022
Celebrating the 15th anniversary of CAPEC™March 2022 is the 15th anniversary of Common Attack Pattern Enumerations and Classifications (CAPEC™). On this important milestone, we…Mar 23, 2022Mar 23, 2022