CWE entries in this view are listed in the 2020 CWE Top 25 Most Dangerous Software Weaknesses.
Nature | Mapping | Type | ID | Name |
---|
This entry is a View. Views are not weaknesses and therefore inappropriate to describe the root causes of vulnerabilities.
Use this View or other Views to search and navigate for the appropriate weakness.
Stakeholder | Description |
---|---|
Software Developers | By following the CWE Top 25, developers are able to significantly reduce the number of weaknesses that occur in their software. |
Product Customers | Customers can use the weaknesses in this view in order to formulate independent evidence of a claim by a product vendor to have eliminated / mitigated the most dangerous weaknesses. |
Educators | Educators can use this view to focus curriculum and teachings on the most dangerous weaknesses. |
By following the CWE Top 25, developers are able to significantly reduce the number of weaknesses that occur in their software.
Customers can use the weaknesses in this view in order to formulate independent evidence of a claim by a product vendor to have eliminated / mitigated the most dangerous weaknesses.
Educators can use this view to focus curriculum and teachings on the most dangerous weaknesses.