Security Vulnerabilities
CVE Structure and Format
CVE Assignment Process
CVE Numbering Authority (CNA)
CVE Database Navigation
CVE Entry Components
CWE Hierarchy Structure
CWE Categories
CWE Views
Mapping Vulnerabilities to CWE
Top 25 Most Dangerous Software Errors
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact
Exploit Code Maturity
Remediation Level
Report Confidence
Modified Base Metrics
Confidentiality Requirement
Integrity Requirement
Availability Requirement
OWASP Risk Rating Methodology
Microsoft DREAD Model
NIST Risk Assessment Framework
Industry-Specific Classifications
Previous
1. Fundamentals of Security Vulnerabilities
Go to top
Next
3. Vulnerability Categories by Location