Views
52 structured views over the CWE corpus — each emphasizes a different perspective for engineers, researchers, and tool authors.
Architectural Concepts
This view organizes weaknesses according to common architectural security tactics. It is intended to assist architects in identifying potential mistakes that…
12 weaknesses VIEW-1340CISQ Data Protection Measures
This view outlines the SMM representation of the Automated Source Code Data Protection Measurement specifications, as identified by the Consortium for…
36 weaknesses VIEW-1128CISQ Quality Measures (2016)
This view outlines the most important software quality issues as identified by the Consortium for Information & Software Quality (CISQ) Automated Quality…
4 weaknesses VIEW-1305CISQ Quality Measures (2020)
This view outlines the most important software quality issues as identified by the Consortium for Information & Software Quality (CISQ) Automated Quality…
4 weaknesses VIEW-678Composites
This view displays only composite weaknesses.
0 weaknesses VIEW-1400Comprehensive Categorization for Software Assurance Trends
22 weaknesses VIEW-2000
Comprehensive CWE Dictionary
This view (slice) covers all the elements in CWE.
0 weaknesses VIEW-884CWE Cross-section
This view contains a selection of weaknesses that represent the variety of weaknesses that are captured in CWE, at a level of abstraction that is likely to be…
157 weaknesses VIEW-604Deprecated Entries
CWE nodes in this view (slice) have been deprecated. There should be a reference pointing to the replacement in each deprecated weakness.
0 weaknesses VIEW-1081Entries with Maintenance Notes
CWE entries in this view have maintenance notes. Maintenance notes are an indicator that an entry might change significantly in future versions. This view was…
0 weaknesses VIEW-1194Hardware Design
This view organizes weaknesses around concepts that are frequently used or encountered in hardware design. Accordingly, this view can align closely with the…
13 weaknesses VIEW-709Named Chains
This view displays Named Chains and their components.
0 weaknesses VIEW-1040Quality Weaknesses with Indirect Security Impacts
CWE identifiers in this view (slice) are quality issues that only indirectly make it easier to introduce a vulnerability and/or make the vulnerability more…
0 weaknesses VIEW-1000Research Concepts
This view is intended to facilitate research into weaknesses, including their inter-dependencies, and can be leveraged to systematically identify theoretical…
10 weaknesses VIEW-700Seven Pernicious Kingdoms
This view (graph) organizes weaknesses using a hierarchical structure that is similar to that used by Seven Pernicious Kingdoms.
8 weaknesses VIEW-699Software Development
This view organizes weaknesses around concepts that are frequently used or encountered in software development. This includes all aspects of the software…
40 weaknesses VIEW-888Software Fault Pattern (SFP) Clusters
CWE identifiers in this view are associated with clusters of Software Fault Patterns (SFPs).
23 weaknesses VIEW-677Weakness Base Elements
This view (slice) displays only weakness base elements.
0 weaknesses VIEW-1424Weaknesses Addressed by ISA/IEC 62443 Requirements
This view (slice) covers weaknesses that are addressed by following requirements in the ISA/IEC 62443 series of standards for industrial automation and…
0 weaknesses VIEW-734Weaknesses Addressed by the CERT C Secure Coding Standard (2008)
CWE entries in this view (graph) are fully or partially eliminated by following the guidance presented in the book "The CERT C Secure Coding Standard"…
14 weaknesses VIEW-844Weaknesses Addressed by The CERT Oracle Secure Coding Standard for Java (2011)
CWE entries in this view (graph) are fully or partially eliminated by following the guidance presented in the book "The CERT Oracle Secure Coding Standard for…
17 weaknesses VIEW-1154Weaknesses Addressed by the SEI CERT C Coding Standard
CWE entries in this view (graph) are fully or partially eliminated by following the guidance presented in the online wiki that reflects that current rules and…
17 weaknesses VIEW-868Weaknesses Addressed by the SEI CERT C++ Coding Standard (2016 Version)
CWE entries in this view (graph) are fully or partially eliminated by following the SEI CERT C++ Coding Standard, as published in 2016. This view is no longer…
15 weaknesses VIEW-1133Weaknesses Addressed by the SEI CERT Oracle Coding Standard for Java
CWE entries in this view (graph) are fully or partially eliminated by following the guidance presented in the online wiki that reflects that current rules and…
21 weaknesses VIEW-1178Weaknesses Addressed by the SEI CERT Perl Coding Standard
CWE entries in this view (graph) are fully or partially eliminated by following the guidance presented in the online wiki that reflects that current rules and…
8 weaknesses VIEW-1003Weaknesses for Simplified Mapping of Published Vulnerabilities
CWE entries in this view (graph) may be used to categorize potential weaknesses within sources that handle public, third-party vulnerability information, such…
37 weaknesses VIEW-919Weaknesses in Mobile Applications
CWE entries in this view (slice) are often seen in mobile applications.
0 weaknesses VIEW-711Weaknesses in OWASP Top Ten (2004)
CWE entries in this view (graph) are associated with the OWASP Top Ten, as released in 2004, and as required for compliance with PCI DSS version 1.1. This…
10 weaknesses VIEW-629Weaknesses in OWASP Top Ten (2007)
CWE nodes in this view (graph) are associated with the OWASP Top Ten, as released in 2007. This view is considered obsolete as a newer version of the OWASP…
10 weaknesses VIEW-809Weaknesses in OWASP Top Ten (2010)
CWE nodes in this view (graph) are associated with the OWASP Top Ten, as released in 2010. This view is considered obsolete as a newer version of the OWASP…
10 weaknesses VIEW-928Weaknesses in OWASP Top Ten (2013)
CWE nodes in this view (graph) are associated with the OWASP Top Ten, as released in 2013. This view is considered obsolete as a newer version of the OWASP…
10 weaknesses VIEW-1026Weaknesses in OWASP Top Ten (2017)
CWE nodes in this view (graph) are associated with the OWASP Top Ten, as released in 2017.
10 weaknesses VIEW-1344Weaknesses in OWASP Top Ten (2021)
CWE entries in this view (graph) are associated with the OWASP Top Ten, as released in 2021.
10 weaknesses VIEW-1358Weaknesses in SEI ETF Categories of Security Vulnerabilities in ICS
CWE entries in this view (graph) are associated with the Categories of Security Vulnerabilities in ICS, as published by the Securing Energy Infrastructure…
5 weaknesses VIEW-658Weaknesses in Software Written in C
This view (slice) covers issues that are found in C programs that are not common to all languages.
0 weaknesses VIEW-659Weaknesses in Software Written in C++
This view (slice) covers issues that are found in C++ programs that are not common to all languages.
0 weaknesses VIEW-660Weaknesses in Software Written in Java
This view (slice) covers issues that are found in Java programs that are not common to all languages.
0 weaknesses VIEW-661Weaknesses in Software Written in PHP
This view (slice) covers issues that are found in PHP programs that are not common to all languages.
0 weaknesses VIEW-750Weaknesses in the 2009 CWE/SANS Top 25 Most Dangerous Programming Errors
CWE entries in this view (graph) are listed in the 2009 CWE/SANS Top 25 Programming Errors. This view is considered obsolete as a newer version of the Top 25…
3 weaknesses VIEW-800Weaknesses in the 2010 CWE/SANS Top 25 Most Dangerous Programming Errors
CWE entries in this view (graph) are listed in the 2010 CWE/SANS Top 25 Programming Errors. This view is considered obsolete as a newer version of the Top 25…
4 weaknesses VIEW-900Weaknesses in the 2011 CWE/SANS Top 25 Most Dangerous Software Errors
CWE entries in this view (graph) are listed in the 2011 CWE/SANS Top 25 Most Dangerous Software Errors.
4 weaknesses VIEW-1200Weaknesses in the 2019 CWE Top 25 Most Dangerous Software Errors
CWE entries in this view are listed in the 2019 CWE Top 25 Most Dangerous Software Errors.
25 weaknesses VIEW-1350Weaknesses in the 2020 CWE Top 25 Most Dangerous Software Weaknesses
CWE entries in this view are listed in the 2020 CWE Top 25 Most Dangerous Software Weaknesses.
25 weaknesses VIEW-1343Weaknesses in the 2021 CWE Most Important Hardware Weaknesses List
CWE entries in this view are listed in the 2021 CWE Most Important Hardware Weaknesses List, as determined by the Hardware CWE Special Interest Group (HW CWE…
12 weaknesses VIEW-1337Weaknesses in the 2021 CWE Top 25 Most Dangerous Software Weaknesses
CWE entries in this view are listed in the 2021 CWE Top 25 Most Dangerous Software Weaknesses.
25 weaknesses VIEW-1387Weaknesses in the 2022 CWE Top 25 Most Dangerous Software Weaknesses
CWE entries in this view are listed in the 2022 CWE Top 25 Most Dangerous Software Weaknesses.
25 weaknesses VIEW-1425Weaknesses in the 2023 CWE Top 25 Most Dangerous Software Weaknesses
CWE entries in this view are listed in the 2023 CWE Top 25 Most Dangerous Software Weaknesses.
25 weaknesses VIEW-1430Weaknesses in the 2024 CWE Top 25 Most Dangerous Software Weaknesses
CWE entries in this view are listed in the 2024 CWE Top 25 Most Dangerous Software Weaknesses.
25 weaknesses VIEW-1432Weaknesses in the 2025 CWE Most Important Hardware Weaknesses List
CWE entries in this view are listed in the 2025 CWE Most Important Hardware Weaknesses List, as determined by the Hardware CWE Special Interest Group (HW CWE…
12 weaknesses VIEW-701Weaknesses Introduced During Design
This view (slice) lists weaknesses that can be introduced during design.
0 weaknesses VIEW-702Weaknesses Introduced During Implementation
This view (slice) lists weaknesses that can be introduced during implementation.
0 weaknesses VIEW-635Weaknesses Originally Used by NVD from 2008 to 2016
CWE nodes in this view (slice) were used by NIST to categorize vulnerabilities within NVD, from 2008 to 2016. This original version has been used by many…
19 weaknesses
Don't Let Security
Weigh You Down.
Stop choosing between AI velocity and security debt. Plexicus is the only platform that runs Vibe Coding Security and ASPM in parallel — one workflow, every codebase.