Table of Contents
1Scope
2References
3Definitions
4Abbreviationsandacronyms
5Conventions
6High-levelrequirements
7Accuracy
8Effectiveness
9Documentation
10CWEversionusage
11RevocationofCWEcompatibility
12Reviewauthority
AnnexA-Type-specificrequirements
AnnexB-Mediarequirements
AppendixI-ListofCWErepositoriesforidentifiers
andtheassociatedcontextinformation
AppendixII-Listofreviewauthorities
Bibliography Abstract
Specifies a structured means to exchange information security weaknesses that provides common names for publicly known problems in the commercial or open source software used in communication networks, end user devices, or any of the other types of information and communications technology (ICT) capable of running software.