<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by CWE Program on Medium]]></title>
        <description><![CDATA[Stories by CWE Program on Medium]]></description>
        <link>https://medium.com/@CWE_CAPEC?source=rss-674e9717194c------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/fit/c/150/150/1*6qMGWeLVKOra01d99tTiag.jpeg</url>
            <title>Stories by CWE Program on Medium</title>
            <link>https://medium.com/@CWE_CAPEC?source=rss-674e9717194c------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Sun, 12 Apr 2026 18:06:18 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@CWE_CAPEC/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[CWE Is Focus of Three Talks at “VulnCon 2026”]]></title>
            <link>https://medium.com/@CWE_CAPEC/cwe-is-focus-of-three-talks-at-vulncon-2026-d53d5cd729d4?source=rss-674e9717194c------2</link>
            <guid isPermaLink="false">https://medium.com/p/d53d5cd729d4</guid>
            <category><![CDATA[information-technology]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[information-security]]></category>
            <category><![CDATA[application-security]]></category>
            <category><![CDATA[vulnerability]]></category>
            <dc:creator><![CDATA[CWE Program]]></dc:creator>
            <pubDate>Fri, 10 Apr 2026 13:58:07 GMT</pubDate>
            <atom:updated>2026-04-10T13:58:07.267Z</atom:updated>
            <content:encoded><![CDATA[<p><a href="https://cwe.mitre.org/">Common Weakness Enumeration (CWE™)</a> is the main focus of three talks at <a href="https://www.first.org/conference/vulncon26/"><em>CVE/FIRST VulnCon 2026</em></a> being held at the DoubleTree Resort by Hilton Hotel Paradise Valley — Scottsdale, in Scottsdale, Arizona, USA, on April 13–16, 2026:</p><ul><li>“<a href="https://www.first.org/conference/vulncon26/program#pDeep-Dive-Workshop-into-CVE-to-CWE-Root-Cause-Mapping"><strong>Deep Dive Workshop into CVE-to-CWE Root Cause Mapping</strong></a>” by Connor Mullaly, Steve Christey Coley (The MITRE Corporation) (Monday, April 13, 13:30–17:30)</li><li>“<a href="https://www.first.org/conference/vulncon26/program#pBoosting-Vulnerability-Intelligence-How-Accurate-CWE-Mappings-Transform-ML-Model-Performance"><strong>Boosting Vulnerability Intelligence: How Accurate CWE Mappings Transform ML Model Performance</strong></a>” by David Starobinski, Sevval Simsek, Varsha Athreya (Boston University) (Tuesday, April 14, 14:35–15:05)</li><li>“<a href="https://www.first.org/conference/vulncon26/program#pFrom-Roadmap-to-Results-Measuring-CWE-Adoption-to-Enable-Prevention"><strong>From Roadmap to Results: Measuring CWE Adoption to Enable Prevention</strong></a>” by Alec Summers, Steve Christey Coley (The MITRE Corporation) (Wednesday, April 15, 16:30–17:30)</li></ul><figure><img alt="“CVE/FIRST VulnCon 2026“ is being held at the DoubleTree Resort by Hilton Hotel Paradise Valley — Scottsdale, in Scottsdale, Arizona, USA, on April 13–16, 2026." src="https://cdn-images-1.medium.com/max/994/1*rRhdML4kEAiVzBKQ9m1xDg.png" /><figcaption><a href="https://www.first.org/conference/vulncon26/program">https://www.first.org/conference/vulncon26/program</a></figcaption></figure><p>We look forward to seeing you there!</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=d53d5cd729d4" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[“2025 CWE Top 25 Most Dangerous Software Weaknesses” List Now Available]]></title>
            <link>https://medium.com/@CWE_CAPEC/2025-cwe-top-25-most-dangerous-software-weaknesses-list-now-available-26411165a5e4?source=rss-674e9717194c------2</link>
            <guid isPermaLink="false">https://medium.com/p/26411165a5e4</guid>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[information-security]]></category>
            <category><![CDATA[software-architecture]]></category>
            <category><![CDATA[software-development]]></category>
            <category><![CDATA[software-engineering]]></category>
            <dc:creator><![CDATA[CWE Program]]></dc:creator>
            <pubDate>Thu, 12 Feb 2026 17:57:41 GMT</pubDate>
            <atom:updated>2026-02-12T17:57:41.214Z</atom:updated>
            <content:encoded><![CDATA[<p>The “<a href="https://cwe.mitre.org/news/archives/news2025.html#december11_2025_CWE_Top_25_Now_Available">2025 Common Weakness Enumeration (CWE) Top 25 Most Dangerous Software Weaknesses</a>” (CWE Top 25) list was released on December 19, 2025, on the CWE website.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/409/1*LgDfiV2i_8siS3V_G1aiWQ.png" /><figcaption><a href="https://cwe.mitre.org/top25/">https://cwe.mitre.org/top25/</a></figcaption></figure><p>The Top 25 highlights the most severe and prevalent weaknesses behind the 39,080 <a href="https://www.cve.org/">CVE™ Records</a> in this year’s dataset. Uncovering the root causes of these vulnerabilities serves as a powerful guide for investments, policies, and practices to prevent these vulnerabilities from occurring in the first place. These weaknesses lead to serious vulnerabilities in software, and an attacker can often exploit them to take control of an affected system, steal data, or prevent applications from working.</p><h3><strong>What’s Changed</strong></h3><p>There are several notable shifts in ranked positions of weakness types from last year’s list, including weaknesses dropping away or making their first appearance in a CWE Top 25.</p><p>The 2025 Top 25’s #1 ranked weakness is <a href="https://cwe.mitre.org/data/definitions/79.html">CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross Site Scripting’)</a>, retaining the top position from last year while being the only CWE to not change in ranking. Notable shifts in rankings included <a href="https://cwe.mitre.org/data/definitions/862.html">CWE-862: Missing Authorization</a> moving up 5 ranks to #4, <a href="https://cwe.mitre.org/data/definitions/20.html">CWE-20: Improper Input Validation</a> moving down 6 ranks to #18, and <a href="https://cwe.mitre.org/data/definitions/77.html">CWE-77: Command Injection</a> moving down 10 ranks to #23. Six new CWEs also appeared in the 2025 Top 25, most notably <a href="https://cwe.mitre.org/data/definitions/120.html">CWE-120: Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’)</a> at #11, <a href="https://cwe.mitre.org/data/definitions/352.html">CWE-352: Stack-based Buffer Overflow</a> at #14, and <a href="https://cwe.mitre.org/data/definitions/122.html">CWE-122: Heap-based Buffer Overflow</a> at #16. These new introductions are likely due to a change in methodology this year that allowed for better representation of more specific weaknesses.</p><p>Visit the <a href="https://cwe.mitre.org/top25/archive/2025/2025_key_insights.html">Key Insights</a> page on the CWE website for additional information.</p><h3><strong>Leveraging Real-World Data</strong></h3><p>The 2025 CWE Top 25 is the second year in a row where the <a href="https://www.cve.org/ProgramOrganization/CNAs">CVE Numbering Authority (CNA)</a> community directly contributed CWE mapping reviews within the dataset, leveraging their expert knowledge of the products and access to information that might not be present in the CVE Record. In general, CNAs are best positioned to provide accurate CWE mapping determinations compared to third-party analysts, as CNAs are the authority for vulnerability information within their CNA scope and those closest to the products themselves.</p><p>To create the 2025 list, the CWE Program leveraged public vulnerability data containing CWE mappings and <a href="https://nvd.nist.gov/vuln-metrics/cvss">Common Vulnerability Scoring System (CVSS)</a> scores.</p><p>The 2025 CWE Top 25 leverages CVE Records for vulnerabilities published between June 1, 2024, and June 1, 2025. A scoring formula is used to calculate a ranked order of weaknesses by combining the frequency that a CWE is the root cause of a vulnerability with the average severity of each of those vulnerabilities as measured by CVSS.</p><p>For more information about how the list was created and the ranking methodology, visit the <a href="https://cwe.mitre.org/top25/archive/2025/2025_methodology.html">Methodology</a> page on the CWE website.</p><h3>The 2025 CWE Top 25</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/906/1*gDV-jGDGqsZkPiBs4hGebA.png" /><figcaption><strong>View list on CWE website: </strong><a href="https://cwe.mitre.org/top25/archive/2025/2025_cwe_top25.htm"><strong>https://cwe.mitre.org/top25/archive/2024/2024_cwe_top25.html</strong></a></figcaption></figure><p>Also available now:</p><ul><li><a href="https://cwe.mitre.org/top25/archive/2025/2025_kev_list.html"><strong>2025 CWE Top 10 KEV Weaknesses</strong></a> — Ranking actively exploited weaknesses by CISA’s KEV Catalog.</li><li><a href="https://cwe.mitre.org/top25/archive/2025/2025_onthecusp_list.html"><strong>2025 “On the Cusp” Weaknesses List</strong></a> — 15 additional weaknesses that were “on the cusp” of being included in the 2025 CWE Top 25.</li></ul><h3>Check out the 2025 Top 25 Now</h3><p><a href="https://cwe.mitre.org/top25/archive/2025/2025_cwe_top25.html">https://cwe.mitre.org/top25/archive/2025/2025_cwe_top25.html</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=26411165a5e4" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[“2025 CWE™ Most Important Hardware Weaknesses” Now Available]]></title>
            <link>https://medium.com/@CWE_CAPEC/2025-cwe-most-important-hardware-weaknesses-now-available-2bbe29f85b1a?source=rss-674e9717194c------2</link>
            <guid isPermaLink="false">https://medium.com/p/2bbe29f85b1a</guid>
            <category><![CDATA[information-technology]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[hardware]]></category>
            <category><![CDATA[technology]]></category>
            <category><![CDATA[information-security]]></category>
            <dc:creator><![CDATA[CWE Program]]></dc:creator>
            <pubDate>Wed, 01 Oct 2025 16:23:56 GMT</pubDate>
            <atom:updated>2025-10-01T16:23:56.865Z</atom:updated>
            <content:encoded><![CDATA[<p>The “<a href="https://cwe.mitre.org/topHW/index.html">2025 CWE™ Most Important Hardware Weaknesses</a>” (2025 MIHW) was released on August 20, 2025, on the <a href="https://cwe.mitre.org/">CWE website</a>.</p><p>This new release delivers a major update to the original 2021 release. For the first time, the refreshed MIHW combines comprehensive weakness data with expert opinion from across the hardware security community, equipping organizations with actionable insights to tackle today’s most critical hardware risks.</p><figure><img alt="CWE “2025 Most Important Hardware Weaknesses“ logo" src="https://cdn-images-1.medium.com/max/389/1*IsojhDOc6TNXhMwqtHnqBw.png" /><figcaption><a href="https://cwe.mitre.org/topHW/index.html">https://cwe.mitre.org/topHW/index.html</a></figcaption></figure><h3><strong>Goals</strong></h3><p>The 2025 MIHW aims to drive awareness of critical hardware weaknesses and provide the cybersecurity community with practical guidance to prevent security issues at the source.</p><p>By combining advanced data analysis with expert consensus, the list helps organizations prioritize mitigations, strengthen design practices, and make informed decisions throughout the hardware lifecycle.</p><h3><strong>A Community Effort</strong></h3><p>The 2025 MIHW is the result of broad collaboration within the hardware security community. We extend our deepest gratitude to the 2025 MIHW Working Group whose dedication and hard work made the weakness data collection possible. We also thank the many respondents to the MIHW polls for sharing their expert insights, and all <a href="https://cwe.mitre.org/community/working_groups.html#hw_sig">Hardware CWE SIG</a> members for their ongoing support and contributions.</p><h3><strong>2025 CWE Most Important Hardware Weaknesses</strong></h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/975/1*LIy_P_w2Wb1OgMZNYAEHIg.png" /><figcaption>View these CWE entries on the CWE website:<a href="https://cwe.mitre.org/topHW/archive/2025/2025_CWE_MIHW.html"> https://cwe.mitre.org/topH/archive/2025/2025_CWE_MIHW.html</a></figcaption></figure><h3><strong>Expert Insights: Weaknesses Beyond Data Trends</strong></h3><p>The weaknesses shown below were not included in the 2025 MIHW because they did not have sufficient weakness data to support their inclusion. However, they stand out as expert-driven selections. Each of these weaknesses received high scores from Subject Matter Experts, reflecting strong consensus among those with deep domain knowledge.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/759/1*uHebrObg4Y0o4dP5xYPi4w.png" /><figcaption>View these CWE entries on the CWE website:<a href="https://cwe.mitre.org/topHW/archive/2025/2025_CWE_MIHW.html"> https://cwe.mitre.org/topH/archive/2025/2025_CWE_MIHW.html</a></figcaption></figure><h3><strong>Suggested Use Cases</strong></h3><p>The 2025 MIHW serves as a practical resource for a wide range of stakeholders:</p><ul><li><em>Security Architects and Designers</em> can use the list to prioritize and address key weaknesses</li><li><em>Design Teams</em> benefit by building review checklists around top weaknesses</li><li><em>Security Researchers</em> can focus their investigation and mitigation efforts</li><li><em>Test Engineers</em> are able to target critical weaknesses in their testing</li><li><em>EDA Tool Vendors</em> can enhance tool support for industry-prioritized issues</li><li><em>Educators</em> can align course material with major hardware weaknesses</li></ul><p>Visit the <a href="https://cwe.mitre.org/topHW/archive/2025/2025_MIHW_use_cases">2025 MIHW Use Cases</a> page on the CWE website for a more detailed look at each use case.</p><h3><strong>Learn More About the 2025 MIHW</strong></h3><p>Visit the <a href="https://cwe.mitre.org/topHW/index.html">Most Important Hardware Weaknesses</a> page on the <a href="https://cwe.mitre.org/">CWE website</a> to view more details about the 2025 list, key insights, methodology, use cases, and more.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=2bbe29f85b1a" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Videos of Three CWE-Focused Sessions from “VulnCon 2025 Now Available”]]></title>
            <link>https://medium.com/@CWE_CAPEC/videos-of-three-cwe-focused-sessions-from-vulncon-2025-now-available-ed2057a8f341?source=rss-674e9717194c------2</link>
            <guid isPermaLink="false">https://medium.com/p/ed2057a8f341</guid>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[information-security]]></category>
            <category><![CDATA[vulnerability-management]]></category>
            <category><![CDATA[vulnerability]]></category>
            <category><![CDATA[vulnerability-assessment]]></category>
            <dc:creator><![CDATA[CWE Program]]></dc:creator>
            <pubDate>Thu, 19 Jun 2025 13:32:39 GMT</pubDate>
            <atom:updated>2025-06-19T14:12:41.578Z</atom:updated>
            <content:encoded><![CDATA[<h3>Videos of Three CWE-Focused Sessions from “<em>VulnCon 2025</em>” Now Available</h3><p>Videos of three CWE™-focused sessions from <a href="https://www.first.org/conference/vulncon2025/"><em>CVE/FIRST VulnCon 2025</em></a> — “<a href="https://youtu.be/RcR-EFSptnQ?si=-ZfrG4CLaKlfmVjx">Hard Problems in CWE, and What it Tells us about Hard Problems in the Industry</a>” (presentation), “<a href="https://youtu.be/5bRA2Qxqzd0?si=0sqI7erzV8zeWqfd">How Do We Leverage CVE Root Cause Mapping and CWE Data to Prevent New Vulnerabilities?</a>” (presentation), and “<a href="https://youtu.be/TH1tGO15K24?si=nBtOP8-FnKBd4hUr">Vulnerability Root Cause Mapping with CWE</a>” (presentation) — are now available on the <a href="https://www.youtube.com/channel/UCpY9VIpRmFK4ebD6orssifA">CWE Program Channel on YouTube</a>. Or, watch below:</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FRcR-EFSptnQ%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DRcR-EFSptnQ&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FRcR-EFSptnQ%2Fhqdefault.jpg&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/55b14ea356935744489193c2d500129b/href">https://medium.com/media/55b14ea356935744489193c2d500129b/href</a></iframe><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2F5bRA2Qxqzd0%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D5bRA2Qxqzd0&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2F5bRA2Qxqzd0%2Fhqdefault.jpg&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/4f83c468ba60cacd27007359dd6166b0/href">https://medium.com/media/4f83c468ba60cacd27007359dd6166b0/href</a></iframe><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2F5bRA2Qxqzd0%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D5bRA2Qxqzd0&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2F5bRA2Qxqzd0%2Fhqdefault.jpg&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/4f83c468ba60cacd27007359dd6166b0/href">https://medium.com/media/4f83c468ba60cacd27007359dd6166b0/href</a></iframe><p>View these videos and more on the <a href="https://www.youtube.com/channel/UCpY9VIpRmFK4ebD6orssifA">CWE Program Channel on YouTube</a>.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=ed2057a8f341" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Out-of-Bounds Read Podcast — “Root Cause Mapping and the CWE Top 25”]]></title>
            <link>https://medium.com/@CWE_CAPEC/cwe-podcast-root-cause-mapping-and-the-cwe-top-25-566323c9c39d?source=rss-674e9717194c------2</link>
            <guid isPermaLink="false">https://medium.com/p/566323c9c39d</guid>
            <category><![CDATA[software-engineering]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[software-development]]></category>
            <category><![CDATA[vulnerability]]></category>
            <category><![CDATA[software-architecture]]></category>
            <dc:creator><![CDATA[CWE Program]]></dc:creator>
            <pubDate>Wed, 30 Apr 2025 22:02:59 GMT</pubDate>
            <atom:updated>2025-04-30T22:03:54.842Z</atom:updated>
            <content:encoded><![CDATA[<p>“<a href="https://cwe.mitre.org/news/podcast.html">Out-Of-Bounds Read</a>” is the CWE Program’s free podcast about common weaknesses in software and hardware, the vulnerabilities they cause, how to reduce them, and how using CWE can help make products more secure by design.</p><p>In this episode, “<a href="https://youtu.be/8pe6w3PNpt8">Root Cause Mapping and the CWE Top 25</a>,” CWE Program Lead Alec Summers talks with CWE Technical Lead Steve Christey and CWE Top 25 Lead Connor Mullaly, about <a href="https://cwe.mitre.org/documents/cwe_usage/guidance.html">Root Cause Mapping (RCM)</a> and the <a href="https://cwe.mitre.org/top25/index.html">CWE Top 25</a>.</p><p>Topics include the value and history of the CWE Top 25 and an analysis of the most recent Top 25 list and which weaknesses moved up and down on the list; purpose and benefits of <a href="https://cwe.mitre.org/documents/cwe_usage/guidance.html">mapping the root causes of vulnerabilities</a> identified in <a href="https://www.cve.org/ResourcesSupport/Glossary#glossaryRecord">CVE Records</a> to <a href="https://cwe.mitre.org/documents/glossary/index.html#Weakness">CWE weaknesses</a>; methodology used for RCM of the <a href="https://cwe.mitre.org/top25/archive/2024/2024_cwe_top25.html">2024 CWE Top 25</a> to develop the list and how <a href="https://www.cve.org/ProgramOrganization/CNAs">CVE Numbering Authorities (CNAs)</a> were integral to the process; and, a discussion of follow-on Top 25 lists including the “<a href="https://cwe.mitre.org/top25/archive/2024/2024_onthecusp_list.html">2024 On the Cusp — Other Dangerous Software Weaknesses</a>” and “<a href="https://cwe.mitre.org/top25/archive/2024/2024_kev_list.html">2024 CWE Top 10 KEV Weaknesses</a>” lists. In addition, <a href="https://cwe.mitre.org/documents/cwe_usage/guidance.html">tips for helping improve your RCM</a> are also discussed, such as how best to leverage the <a href="https://cwe.mitre.org/">CWE website</a> for your research, using CWE List keyword search, where to find the vulnerability mapping pointers on all CWE entry pages and what the different indicators mean, the benefits of being a member of the <a href="https://cwe.mitre.org/community/working_groups.html#rcm_wg">Root Cause Mapping Working Group (RCM WG)</a>, and much more.</p><figure><img alt="The CWE Program’s “Out-Of-Bounds Read” podcast — “Root Cause Mapping and the CWE Top 25”" src="https://cdn-images-1.medium.com/max/771/1*4JbwS9QM3i03Ttw2I4AQOg.png" /><figcaption><a href="https://youtu.be/8pe6w3PNpt8">https://youtu.be/8pe6w3PNpt8</a></figcaption></figure><p>The podcast is available for free on the <a href="https://www.youtube.com/channel/UCpY9VIpRmFK4ebD6orssifA">CWE Program Channel on YouTube</a>. Please give our latest episode a listen and let us know what you think by commenting on the <a href="https://www.linkedin.com/showcase/cve-cwe-capec">CWE page on LinkedIn</a>, <a href="https://x.com/CweCapec">CWE on X</a>, <a href="https://mastodon.social/@CWE_Program">CWE on Mastodon</a>, or <a href="https://bsky.app/profile/cweprogram.bsky.social">CWE on Bluesky</a>. We look forward to hearing from you!</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=566323c9c39d" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[CWE Is Main Focus of Four Talks at “VulnCon 2025”]]></title>
            <link>https://medium.com/@CWE_CAPEC/cwe-is-main-focus-of-four-talks-at-vulncon-2025-48924067aaf0?source=rss-674e9717194c------2</link>
            <guid isPermaLink="false">https://medium.com/p/48924067aaf0</guid>
            <category><![CDATA[vulnerability]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[information-security]]></category>
            <category><![CDATA[vulnerability-management]]></category>
            <category><![CDATA[vulnerability-assessment]]></category>
            <dc:creator><![CDATA[CWE Program]]></dc:creator>
            <pubDate>Thu, 03 Apr 2025 12:49:50 GMT</pubDate>
            <atom:updated>2025-04-03T12:52:13.071Z</atom:updated>
            <content:encoded><![CDATA[<h3>CWE Is Focus of Four Talks at “VulnCon 2025”</h3><p><a href="https://cwe.mitre.org/">Common Weakness Enumeration (CWE™)</a> is the main focus of four talks at <a href="https://www.first.org/conference/vulncon2025/"><em>CVE/FIRST VulnCon 2025</em></a> being held at the McKimmon Center in Raleigh, North Carolina, USA, on April 7–10, 2025:</p><ul><li>“<a href="https://www.first.org/conference/vulncon2025/program#pVulnerability-Root-Cause-Mapping-with-CWE-Challenges-Solutions-and-Insights-from-Grounded-LLM-based-Analysis"><strong>Vulnerability Root Cause Mapping with CWE: Challenges, Solutions, and Insights from Grounded LLM-based Analysis</strong></a>” by Alec Summers of the CVE Program and Chris Madden of Yahoo (Monday, April 7, 11:30–12:30)</li><li>“<a href="https://www.first.org/conference/vulncon2025/program#pLessons-Learned-From-Assigning-CWE-s-to-Test-Items-for-Security-Assessments"><strong>Lessons Learned From Assigning CWE’s to Test Items for Security Assessments</strong></a>” by Yuichi Kikuchi, Takayuki Uchiyama of Panasonic PSIRT (Tuesday, April 8, 11:30–12:00)</li><li>“<a href="https://www.first.org/conference/vulncon2025/program#pHow-Do-We-Leverage-CVE-Root-Cause-Mapping-and-CWE-Data-to-Prevent-New-Vulnerabilities"><strong>How Do We Leverage CVE Root Cause Mapping and CWE Data to Prevent New Vulnerabilities?</strong></a>” by Alexander Bushkin and Jeremy West of Red Hat (Tuesday, April 8, 14:00–16:30)</li><li>“<a href="https://www.first.org/conference/vulncon2025/program#pHard-Problems-in-CWE-and-What-it-Tells-us-about-Hard-Problems-in-the-Industry"><strong>Hard Problems in CWE, and What it Tells us about Hard Problems in the Industry (Virtual)</strong></a>” by Steve Christey Coley of the CWE Program (Thursday, April 10, 13:30–14:30)</li></ul><figure><img alt="The Common Vulnerabilities and Exposures (CVE®) Program and FIRST will co-host VulnCon 2025 at the McKimmon Center in Raleigh, North Carolina, USA, on April 7–10, 2025" src="https://cdn-images-1.medium.com/max/1024/1*LtlRacfwcrIVOsIbxLH-8w.png" /><figcaption><a href="https://www.first.org/conference/vulncon2025/">https://www.first.org/conference/vulncon2025/</a></figcaption></figure><p>We look forward to seeing you there!</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=48924067aaf0" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[“2024 CWE Top 25 Most Dangerous Software Weaknesses” List Now Available]]></title>
            <link>https://medium.com/@CWE_CAPEC/2024-cwe-top-25-most-dangerous-software-weaknesses-list-now-available-f9e574d2ffbb?source=rss-674e9717194c------2</link>
            <guid isPermaLink="false">https://medium.com/p/f9e574d2ffbb</guid>
            <category><![CDATA[information-technology]]></category>
            <category><![CDATA[software-engineering]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[software-architecture]]></category>
            <category><![CDATA[software-development]]></category>
            <dc:creator><![CDATA[CWE Program]]></dc:creator>
            <pubDate>Thu, 12 Dec 2024 16:24:07 GMT</pubDate>
            <atom:updated>2026-02-12T17:39:54.502Z</atom:updated>
            <content:encoded><![CDATA[<p>The “<a href="https://cwe.mitre.org/top25/">2024 Common Weakness Enumeration (CWE) Top 25 Most Dangerous Software Weaknesses</a>” (CWE Top 25) list was released on November 19, 2024, on the CWE website.</p><figure><img alt="“Common Weakness Enumeration (CWE™) Top 25 Most Dangerous Software Weaknesses” logo" src="https://cdn-images-1.medium.com/max/409/1*LgDfiV2i_8siS3V_G1aiWQ.png" /><figcaption><a href="https://cwe.mitre.org/top25/">https://cwe.mitre.org/top25/</a></figcaption></figure><p>The Top 25 highlights the most severe and prevalent weaknesses behind the 31,770 <a href="https://www.cve.org/">CVE™ Records</a> in this year’s dataset. Uncovering the root causes of these vulnerabilities serves as a powerful guide for investments, policies, and practices to prevent these vulnerabilities from occurring in the first place. These weaknesses lead to serious vulnerabilities in software, and an attacker can often exploit them to take control of an affected system, steal data, or prevent applications from working.</p><h4>What’s Changed</h4><p>There are several notable shifts in ranked positions of weakness types from last year’s list, including weaknesses dropping away or making their first appearance in a CWE Top 25.</p><p>The 2024 Top 25’s #1 ranked weakness is <a href="https://cwe.mitre.org/data/definitions/79.html">CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross Site Scripting’)</a>, which regains the top position from <a href="https://cwe.mitre.org/data/definitions/787.html">CWE-787: Out-of-bounds Write</a> after three years. Weaknesses moving up the rankings this year include <a href="https://cwe.mitre.org/data/definitions/352.html">CWE-352: Cross-Site Request Forgery (CSRF)</a>, <a href="https://cwe.mitre.org/data/definitions/94.html">CWE-94: Improper Control of Generation of Code (‘Code Injection’)</a>, <a href="https://cwe.mitre.org/data/definitions/269.html">CWE-269: Improper Privilege Management</a>, and <a href="https://cwe.mitre.org/data/definitions/863.html">CWE-863: Incorrect Authorization</a>, while <a href="https://cwe.mitre.org/data/definitions/20.html">CWE-20: Improper Input Validation</a>, <a href="https://cwe.mitre.org/data/definitions/476.html">CWE-476: NULL Pointer Dereference</a>, <a href="https://cwe.mitre.org/data/definitions/190.html">CWE-190: Integer Overflow or Wraparound</a>, and <a href="https://cwe.mitre.org/data/definitions/306.html">CWE-306: Missing Authentication</a> moved down. Two weaknesses fell off the Top 25 list this year, <a href="https://cwe.mitre.org/data/definitions/362.html">CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)</a> and <a href="https://cwe.mitre.org/data/definitions/276.html">CWE-276: Incorrect Default Permissions</a>, which were replaced with <a href="https://cwe.mitre.org/data/definitions/400.html">CWE-400: Uncontrolled Resource Consumption</a> and <a href="https://cwe.mitre.org/data/definitions/200.html">CWE-200: Exposure of Sensitive Information to an Unauthorized Actor</a>.</p><p>Visit the <a href="https://cwe.mitre.org/top25/archive/2024/2024_key_insights.html">Key Insights</a> page on the CWE website for additional information.</p><h4>Leveraging Real-World Data</h4><p>Importantly, the 2024 CWE Top 25 is the first published list where the <a href="https://www.cve.org/ProgramOrganization/CNAs">Common Vulnerabilities and Exposures (CVE®) Numbering Authority (CNA)</a> community directly contributed CWE mapping reviews within the dataset, leveraging their expert knowledge of the products and access to information that might not be present in the CVE Record. In general, CNAs are best positioned to provide accurate CWE mapping determinations compared to third-party analysts, as CNAs are the authority for vulnerability information within their CNA scope and those closest to the products themselves.</p><p>To create the 2024 list, the CWE Program leveraged public vulnerability data containing CWE mappings and <a href="https://nvd.nist.gov/vuln-metrics/cvss">Common Vulnerability Scoring System (CVSS)</a> scores. A formula was then applied to the data to score each weakness based on prevalence and severity.</p><p>The 2024 CWE Top 25 leverages CVE Records for vulnerabilities published between June 1, 2023, and June 1, 2024. A scoring formula is used to calculate a ranked order of weaknesses by combining the frequency that a CWE is the root cause of a vulnerability with the average severity of each of those vulnerabilities as measured by CVSS.</p><p>For more information about how the list was created and the ranking methodology, visit the <a href="https://cwe.mitre.org/top25/archive/2024/2024_methodology.html">Methodology</a> page on the CWE website. Also, be sure to also check out the <a href="https://cwe.mitre.org/top25/archive/2024/2024_cwe_top25.html">CWE Top 25</a> page going forward for additional articles and insight.</p><h4>The 2024 CWE Top 25</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/934/1*-cLjkvoa2WZA_9-qU06YuQ.png" /><figcaption><strong>View list on CWE website: </strong><a href="https://cwe.mitre.org/top25/archive/2024/2024_cwe_top25.html"><strong>https://cwe.mitre.org/top25/archive/2024/2024_cwe_top25.html</strong></a></figcaption></figure><h4>Follow-on Information Coming Soon</h4><p>Over the coming weeks and months, the CWE Program will continue publishing further analyses to help illustrate how root cause mapping and vulnerability management plays an important role in shifting the balance of cybersecurity risk. These will include but may not be limited to the following:</p><ul><li>Weaknesses on the Cusp — Those weaknesses that did not make the 2024 CWE Top 25 of which readers should be aware.</li><li>Actively Exploited — Ranking weaknesses by the Cybersecurity and Infrastructure Security Agency’s (CISA) <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog">Known Exploited Vulnerabilities (KEV) Catalog</a>.</li></ul><p>Visit the <a href="https://cwe.mitre.org/">CWE website</a> regularly for updates.</p><h4>Check out the 2024 Top 25 Now</h4><p><a href="https://cwe.mitre.org/top25/archive/2024/2024_cwe_top25.html">https://cwe.mitre.org/top25/archive/2024/2024_cwe_top25.html</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=f9e574d2ffbb" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[CWE REST API Now Available]]></title>
            <link>https://medium.com/@CWE_CAPEC/cwe-rest-api-now-available-2af1891971b4?source=rss-674e9717194c------2</link>
            <guid isPermaLink="false">https://medium.com/p/2af1891971b4</guid>
            <category><![CDATA[information-security]]></category>
            <category><![CDATA[software-development]]></category>
            <category><![CDATA[information-technology]]></category>
            <category><![CDATA[software-engineering]]></category>
            <category><![CDATA[automation]]></category>
            <dc:creator><![CDATA[CWE Program]]></dc:creator>
            <pubDate>Thu, 08 Aug 2024 14:07:09 GMT</pubDate>
            <atom:updated>2024-08-08T14:07:09.085Z</atom:updated>
            <content:encoded><![CDATA[<p>The <a href="https://cwe.mitre.org/">CWE™ Program</a> is pleased to announce that the “CWE REST API” is now available. We thank the <a href="https://cwe.mitre.org/community/working_groups.html#rest_api_wg">REST API Working Group</a> for their collaboration in developing the API.</p><p>The CWE REST API enables program partners in vulnerability management as well as software (SW) and hardware (HW) developers and architects, electronic design automation (EDA) tool developers, verification engineers, and others who are concerned about mitigating security risks in their products an easy and efficient way to stay up to date with CWE content.</p><p>We expect this API to be a major improvement for leveraging CWE content changes as it is always up to date when requested by downstream applications and provided using a JSON representation.</p><h4><strong>Accessing the CWE REST API</strong></h4><p>The root URL to access the CWE REST API, which is available without any need to register or use any credentials, is available <a href="https://github.com/CWE-CAPEC/REST-API-wg/blob/main/Quick%20Start.md">here</a>.</p><p>We suggest using the API to populate a cache of the CWE content locally, which can be refreshed whenever a new release becomes available.</p><h4><strong>Documentation, Available Endpoints, and More</strong></h4><p>To view the API documentation, a list of endpoints, as well as several example endpoint URLs, please visit the “<a href="https://github.com/CWE-CAPEC/REST-API-wg/blob/main/Quick%20Start.md">Quick Start Instructions for CWE REST API Users</a>” on GitHub.</p><p>Please email us at <a href="mailto:cwe@mitre.org?subject=Requesting information about CWE REST API">cwe@mitre.org</a> with any comments or concerns.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=2af1891971b4" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[CWE Program Embarks on Improving Usability]]></title>
            <link>https://medium.com/@CWE_CAPEC/cwe-program-embarks-on-improving-usability-c73fbcefcaa2?source=rss-674e9717194c------2</link>
            <guid isPermaLink="false">https://medium.com/p/c73fbcefcaa2</guid>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[software-engineering]]></category>
            <category><![CDATA[information-technology]]></category>
            <category><![CDATA[software-development]]></category>
            <category><![CDATA[vulnerability]]></category>
            <dc:creator><![CDATA[CWE Program]]></dc:creator>
            <pubDate>Thu, 18 Jul 2024 21:46:57 GMT</pubDate>
            <atom:updated>2024-07-18T21:52:54.699Z</atom:updated>
            <content:encoded><![CDATA[<p>In a significant step towards enhancing usability, the <a href="https://cwe.mitre.org/">Common Weakness Enumeration (CWE™) Program</a>, in collaboration with the <a href="https://cwe.mitre.org/community/working_groups.html#ue_wg">CWE User Experience Working Group (UEWG)</a> and the <a href="https://cwe.mitre.org/community/working_groups.html#rcm_wg">Root Cause Mapping Working Group (RCM WG)</a>, will be introducing a series of comprehensive improvements in upcoming CWE releases. The improvements aim to enhance the understandability, navigability, and usability of all CWE content.</p><p>There are two main thrusts to the usability improvements, referred to as “macro-level” and “micro-level” improvements:</p><ul><li><strong>Macro-level improvements</strong> — Focused on better organization of CWEs at a structural, site-wide level, simplifying access to various views and groupings, enhancing site-wide navigation, and ensuring all entries are populated with the necessary elements.</li><li><strong>Micro-level improvements</strong> — Focused on revising CWEs for clarity, removing redundancy, simplifying descriptions, reorder schema elements to foreground key information, and adding visualizations to entries for better topic explanation.</li></ul><p>Some micro-level improvements were implemented with the release of <a href="https://cwe.mitre.org/data/index.html">CWE 4.15</a> on July 16, 2024, while macro-level improvements will be implemented in the future. A complete list of the micro-level improvements is noted in the “<a href="https://cwe.mitre.org/news/archives/news2024.html#july16_CWE_Version_4.15_Now_Available">CWE Version 4.15 Now Available</a>” news article, a visual example of which, is included below.</p><p>Before and after examples of the micro-level CWE entry page usability improvements are available below. Note that these images show only the tops of the CWE Entry page, using <a href="https://cwe.mitre.org/data/definitions/798.html">CWE-798</a> as the example. Sections of the entry that are not shown above will continue to be included on the entry page but are omitted here for brevity.</p><figure><img alt="Before and After Examples of Usability Improvements on CWE Entry Pages — Before" src="https://cdn-images-1.medium.com/max/1024/0*2vfTCzCiGb9zFDsf.png" /><figcaption>CWE-798 — Before usability improvements</figcaption></figure><figure><img alt="Before and After Examples of Usability Improvements on CWE Entry Pages — After" src="https://cdn-images-1.medium.com/max/1024/0*bxoeakw4azw2aywj.png" /><figcaption>CWE-798 — After usability improvements</figcaption></figure><p>Feedback about these improvements is welcome at <a href="mailto:cwe@mitre.org?subject=Useability%20Improvements%20Feedback">cwe@mitre.org</a>.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=c73fbcefcaa2" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Major Usability Improvements to Viewing CWE Content Underway]]></title>
            <link>https://medium.com/@CWE_CAPEC/major-usability-improvements-to-viewing-cwe-content-underway-359529b4b4a0?source=rss-674e9717194c------2</link>
            <guid isPermaLink="false">https://medium.com/p/359529b4b4a0</guid>
            <category><![CDATA[software-engineering]]></category>
            <category><![CDATA[software-development]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[vulnerability]]></category>
            <category><![CDATA[information-technology]]></category>
            <dc:creator><![CDATA[CWE Program]]></dc:creator>
            <pubDate>Mon, 10 Jun 2024 16:08:09 GMT</pubDate>
            <atom:updated>2024-06-10T16:09:07.995Z</atom:updated>
            <content:encoded><![CDATA[<p>The <a href="https://cwe.mitre.org/">Common Weakness Enumeration (CWE™) Program</a> is currently in the process of making changes to the presentation of <a href="https://cwe.mitre.org/documents/glossary/index.html#Entry">CWE entries</a> and have prepared a set of usability mockups as a preview for the community.</p><p>Please note that the content within these mockups is still actively being worked on, so we are not seeking detailed feedback on this aspect at this stage. However, we would appreciate your thoughts on the proposed layout and design elements, as well as the overall user experience.</p><p>We are inviting you to provide your feedback early in our working process so that we can incorporate your valuable insights and suggestions. The changes we are proposing are focused on presenting important and concise text first for easy digestion by the reader.</p><p>To give you a better idea of our proposed changes, here are a couple of points that we are considering:</p><p>* Concise summary of the weakness with a visual aid<br> * A slight reordering of elements to be: “Alternate Terms,” “Consequences,” then “Mitigations” <br> * Remaining elements would then follow</p><p>You can view a before (on the left) and after (on the right) example of the CWE entry page usability improvements below:</p><figure><img alt="Before image of the current webpage for https://cwe.mitre.org/data/definitions/89.html on the left in comparison to proposed usability improvements of the same webpage on the right with an easier-to-understand presentation of the basic content included in the entry along with a visual representation of the weakness." src="https://cdn-images-1.medium.com/max/1024/1*Jf08ngQWEk3aPVzYEWugzw.png" /><figcaption>These images show only the tops of the CWE Entry page, using <a href="https://cwe.mitre.org/data/definitions/89.html">CWE-89</a> as the example. Sections of the entry that are not shown above will continue to be included on the entry page but are omitted here for brevity.</figcaption></figure><p>Please comment here on Medium or send your comments to us directly at <a href="mailto:cwe@mitre.org">cwe@mitre.org</a>. We look forward to hearing from you!</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=359529b4b4a0" width="1" height="1" alt="">]]></content:encoded>
        </item>
    </channel>
</rss>