Explore vulnerability types, software, and hardware weaknesses.
A PILLAR is a general type of software weakness that acts as a framework for understanding related weaknesses, such as class, base, or variant weaknesses. Unlike a Category, which groups similar traits, a Pillar specifically describes a particular mistake in software.
When assigning CWE identifiers to vulnerabilities it is DISCOURAGED to use PILLAR Identifiers as it does not address the root cause of a vulnerability.
ID | Name | Type | Count | Percent |
---|
A CLASS is a type of software weakness that is described in broad terms. It is more specific than a Pillar Weakness, but more general than a Base or Variant Weakness. These weaknesses usually focus on issues related to one or two of these areas: behavior, property, and resources.
When assigning CWE identifiers to vulnerabilities it is DISCOURAGED to use CLASS identifiers as it does not address the root cause of a vulnerability. There are rare exceptions to this rule, please see the individual CWE for details.
ID | Name | Type | Count | Percent |
---|
A BASE is a software weakness exists that is not tied to any specific resource or technology. This type of weakness provides clear methods for detecting and preventing issues. It usually describes problems in terms of two or three of the following areas: behavior, property, technology, language, and resource.
When assigning CWE identifiers to vulnerabilities it is ENCOURAGED to use BASE identifiers as it addresses the root cause of a vulnerability.
ID | Name | Type | Count | Percent |
---|
A VARIANT s a weakness in software is associated with a specific type of product, often linked to a particular language or technology. It is more specific than a base weakness. These variant-level weaknesses typically describe issues using 3 to 5 of the following dimensions: behavior, property, technology, language, and resource.
When assigning CWE identifiers to vulnerabilities it is ENCOURAGED to use VARIANT identifiers where it's applicable as it addresses the root cause of a vulnerability.
ID | Name | Type | Count | Percent |
---|
A COMPOSITE s a weakness in software is associated with a specific type of product, often linked to a particular language or technology. It is more specific than a base weakness. These variant-level weaknesses typically describe issues using 3 to 5 of the following dimensions: behavior, property, technology, language, and resource.
When assigning CWE identifiers to vulnerabilities it is ENCOURAGED to use COMPOSITE identifiers where it's applicable as it addresses the root cause of a vulnerability.
ID | Name | Type | Count | Percent |
---|