Explore the 2020 CWE Top 25 Most Dangerous Software Weaknesses and learn how to mitigate critical vulnerabilities. Understand the hierarchical relationships between different levels of abstraction.
The software weaknesses listed in this view are the 2020 CWE Top 25 Most Dangerous Software Weaknesses.
The graph provided illustrates the hierarchical relationships between different levels of abstraction for weaknesses. Starting at the highest level, there are categories and pillars that serve to group weaknesses. Categories are not weaknesses themselves, but rather special CWE entries used to bring together weaknesses with shared characteristics. Pillars, on the other hand, represent weaknesses described in a highly abstract manner. Beneath these top-level entries, there are weaknesses at various levels of abstraction. Classes are still abstract, typically not specific to any particular programming language or technology. Base level weaknesses, on the other hand, focus on presenting a more specific type of weakness. Variants are weaknesses described at a very specific level, often limited to a particular language or technology. Chains refer to sets of weaknesses that must be sequentially reachable in order to exploit a vulnerability. Conversely, composites are sets of weaknesses that must all be present simultaneously in order to exploit a vulnerability.