Views

52 structured views over the CWE corpus — each emphasizes a different perspective for engineers, researchers, and tool authors.

VIEW-1008

Architectural Concepts

This view organizes weaknesses according to common architectural security tactics. It is intended to assist architects in identifying potential mistakes that…

12 weaknesses
VIEW-1340

CISQ Data Protection Measures

This view outlines the SMM representation of the Automated Source Code Data Protection Measurement specifications, as identified by the Consortium for…

36 weaknesses
VIEW-1128

CISQ Quality Measures (2016)

This view outlines the most important software quality issues as identified by the Consortium for Information & Software Quality (CISQ) Automated Quality…

4 weaknesses
VIEW-1305

CISQ Quality Measures (2020)

This view outlines the most important software quality issues as identified by the Consortium for Information & Software Quality (CISQ) Automated Quality…

4 weaknesses
VIEW-678

Composites

This view displays only composite weaknesses.

0 weaknesses
VIEW-1400

Comprehensive Categorization for Software Assurance Trends

22 weaknesses
VIEW-2000

Comprehensive CWE Dictionary

This view (slice) covers all the elements in CWE.

0 weaknesses
VIEW-884

CWE Cross-section

This view contains a selection of weaknesses that represent the variety of weaknesses that are captured in CWE, at a level of abstraction that is likely to be…

157 weaknesses
VIEW-604

Deprecated Entries

CWE nodes in this view (slice) have been deprecated. There should be a reference pointing to the replacement in each deprecated weakness.

0 weaknesses
VIEW-1081

Entries with Maintenance Notes

CWE entries in this view have maintenance notes. Maintenance notes are an indicator that an entry might change significantly in future versions. This view was…

0 weaknesses
VIEW-1194

Hardware Design

This view organizes weaknesses around concepts that are frequently used or encountered in hardware design. Accordingly, this view can align closely with the…

13 weaknesses
VIEW-709

Named Chains

This view displays Named Chains and their components.

0 weaknesses
VIEW-1040

Quality Weaknesses with Indirect Security Impacts

CWE identifiers in this view (slice) are quality issues that only indirectly make it easier to introduce a vulnerability and/or make the vulnerability more…

0 weaknesses
VIEW-1000

Research Concepts

This view is intended to facilitate research into weaknesses, including their inter-dependencies, and can be leveraged to systematically identify theoretical…

10 weaknesses
VIEW-700

Seven Pernicious Kingdoms

This view (graph) organizes weaknesses using a hierarchical structure that is similar to that used by Seven Pernicious Kingdoms.

8 weaknesses
VIEW-699

Software Development

This view organizes weaknesses around concepts that are frequently used or encountered in software development. This includes all aspects of the software…

40 weaknesses
VIEW-888

Software Fault Pattern (SFP) Clusters

CWE identifiers in this view are associated with clusters of Software Fault Patterns (SFPs).

23 weaknesses
VIEW-677

Weakness Base Elements

This view (slice) displays only weakness base elements.

0 weaknesses
VIEW-1424

Weaknesses Addressed by ISA/IEC 62443 Requirements

This view (slice) covers weaknesses that are addressed by following requirements in the ISA/IEC 62443 series of standards for industrial automation and…

0 weaknesses
VIEW-734

Weaknesses Addressed by the CERT C Secure Coding Standard (2008)

CWE entries in this view (graph) are fully or partially eliminated by following the guidance presented in the book "The CERT C Secure Coding Standard"…

14 weaknesses
VIEW-844

Weaknesses Addressed by The CERT Oracle Secure Coding Standard for Java (2011)

CWE entries in this view (graph) are fully or partially eliminated by following the guidance presented in the book "The CERT Oracle Secure Coding Standard for…

17 weaknesses
VIEW-1154

Weaknesses Addressed by the SEI CERT C Coding Standard

CWE entries in this view (graph) are fully or partially eliminated by following the guidance presented in the online wiki that reflects that current rules and…

17 weaknesses
VIEW-868

Weaknesses Addressed by the SEI CERT C++ Coding Standard (2016 Version)

CWE entries in this view (graph) are fully or partially eliminated by following the SEI CERT C++ Coding Standard, as published in 2016. This view is no longer…

15 weaknesses
VIEW-1133

Weaknesses Addressed by the SEI CERT Oracle Coding Standard for Java

CWE entries in this view (graph) are fully or partially eliminated by following the guidance presented in the online wiki that reflects that current rules and…

21 weaknesses
VIEW-1178

Weaknesses Addressed by the SEI CERT Perl Coding Standard

CWE entries in this view (graph) are fully or partially eliminated by following the guidance presented in the online wiki that reflects that current rules and…

8 weaknesses
VIEW-1003

Weaknesses for Simplified Mapping of Published Vulnerabilities

CWE entries in this view (graph) may be used to categorize potential weaknesses within sources that handle public, third-party vulnerability information, such…

37 weaknesses
VIEW-919

Weaknesses in Mobile Applications

CWE entries in this view (slice) are often seen in mobile applications.

0 weaknesses
VIEW-711

Weaknesses in OWASP Top Ten (2004)

CWE entries in this view (graph) are associated with the OWASP Top Ten, as released in 2004, and as required for compliance with PCI DSS version 1.1. This…

10 weaknesses
VIEW-629

Weaknesses in OWASP Top Ten (2007)

CWE nodes in this view (graph) are associated with the OWASP Top Ten, as released in 2007. This view is considered obsolete as a newer version of the OWASP…

10 weaknesses
VIEW-809

Weaknesses in OWASP Top Ten (2010)

CWE nodes in this view (graph) are associated with the OWASP Top Ten, as released in 2010. This view is considered obsolete as a newer version of the OWASP…

10 weaknesses
VIEW-928

Weaknesses in OWASP Top Ten (2013)

CWE nodes in this view (graph) are associated with the OWASP Top Ten, as released in 2013. This view is considered obsolete as a newer version of the OWASP…

10 weaknesses
VIEW-1026

Weaknesses in OWASP Top Ten (2017)

CWE nodes in this view (graph) are associated with the OWASP Top Ten, as released in 2017.

10 weaknesses
VIEW-1344

Weaknesses in OWASP Top Ten (2021)

CWE entries in this view (graph) are associated with the OWASP Top Ten, as released in 2021.

10 weaknesses
VIEW-1358

Weaknesses in SEI ETF Categories of Security Vulnerabilities in ICS

CWE entries in this view (graph) are associated with the Categories of Security Vulnerabilities in ICS, as published by the Securing Energy Infrastructure…

5 weaknesses
VIEW-658

Weaknesses in Software Written in C

This view (slice) covers issues that are found in C programs that are not common to all languages.

0 weaknesses
VIEW-659

Weaknesses in Software Written in C++

This view (slice) covers issues that are found in C++ programs that are not common to all languages.

0 weaknesses
VIEW-660

Weaknesses in Software Written in Java

This view (slice) covers issues that are found in Java programs that are not common to all languages.

0 weaknesses
VIEW-661

Weaknesses in Software Written in PHP

This view (slice) covers issues that are found in PHP programs that are not common to all languages.

0 weaknesses
VIEW-750

Weaknesses in the 2009 CWE/SANS Top 25 Most Dangerous Programming Errors

CWE entries in this view (graph) are listed in the 2009 CWE/SANS Top 25 Programming Errors. This view is considered obsolete as a newer version of the Top 25…

3 weaknesses
VIEW-800

Weaknesses in the 2010 CWE/SANS Top 25 Most Dangerous Programming Errors

CWE entries in this view (graph) are listed in the 2010 CWE/SANS Top 25 Programming Errors. This view is considered obsolete as a newer version of the Top 25…

4 weaknesses
VIEW-900

Weaknesses in the 2011 CWE/SANS Top 25 Most Dangerous Software Errors

CWE entries in this view (graph) are listed in the 2011 CWE/SANS Top 25 Most Dangerous Software Errors.

4 weaknesses
VIEW-1200

Weaknesses in the 2019 CWE Top 25 Most Dangerous Software Errors

CWE entries in this view are listed in the 2019 CWE Top 25 Most Dangerous Software Errors.

25 weaknesses
VIEW-1350

Weaknesses in the 2020 CWE Top 25 Most Dangerous Software Weaknesses

CWE entries in this view are listed in the 2020 CWE Top 25 Most Dangerous Software Weaknesses.

25 weaknesses
VIEW-1343

Weaknesses in the 2021 CWE Most Important Hardware Weaknesses List

CWE entries in this view are listed in the 2021 CWE Most Important Hardware Weaknesses List, as determined by the Hardware CWE Special Interest Group (HW CWE…

12 weaknesses
VIEW-1337

Weaknesses in the 2021 CWE Top 25 Most Dangerous Software Weaknesses

CWE entries in this view are listed in the 2021 CWE Top 25 Most Dangerous Software Weaknesses.

25 weaknesses
VIEW-1387

Weaknesses in the 2022 CWE Top 25 Most Dangerous Software Weaknesses

CWE entries in this view are listed in the 2022 CWE Top 25 Most Dangerous Software Weaknesses.

25 weaknesses
VIEW-1425

Weaknesses in the 2023 CWE Top 25 Most Dangerous Software Weaknesses

CWE entries in this view are listed in the 2023 CWE Top 25 Most Dangerous Software Weaknesses.

25 weaknesses
VIEW-1430

Weaknesses in the 2024 CWE Top 25 Most Dangerous Software Weaknesses

CWE entries in this view are listed in the 2024 CWE Top 25 Most Dangerous Software Weaknesses.

25 weaknesses
VIEW-1432

Weaknesses in the 2025 CWE Most Important Hardware Weaknesses List

CWE entries in this view are listed in the 2025 CWE Most Important Hardware Weaknesses List, as determined by the Hardware CWE Special Interest Group (HW CWE…

12 weaknesses
VIEW-701

Weaknesses Introduced During Design

This view (slice) lists weaknesses that can be introduced during design.

0 weaknesses
VIEW-702

Weaknesses Introduced During Implementation

This view (slice) lists weaknesses that can be introduced during implementation.

0 weaknesses
VIEW-635

Weaknesses Originally Used by NVD from 2008 to 2016

CWE nodes in this view (slice) were used by NIST to categorize vulnerabilities within NVD, from 2008 to 2016. This original version has been used by many…

19 weaknesses
Ready when you are

Don't Let Security
Weigh You Down.

Stop choosing between AI velocity and security debt. Plexicus is the only platform that runs Vibe Coding Security and ASPM in parallel — one workflow, every codebase.