CWE

Common Weakness Enumeration

A community-developed list of SW & HW weaknesses that can become vulnerabilities

New to CWE? click here!
CWE Most Important Hardware Weaknesses
CWE Top 25 Most Dangerous Weaknesses
 
ID

CWE
Knowing the weaknesses that result in vulnerabilities means software developers, hardware designers, and security architects can eliminate them before deployment, when it is much easier and cheaper to do so
Overview – Learn what CWE is and how to use the information available on this website Root Cause Mapping – Learn about identifying the underlying cause(s) of a vulnerability
Page Last Updated: April 08, 2026