Cloud Defense Logo

Products

Solutions

Company

CWE-700: Seven Pernicious Kingdoms View

Explore the hierarchical structure of weaknesses in the Seven Pernicious Kingdoms view, resembling an organizational framework. Discover categories, pillars, classes, base level weaknesses, variants, chains, and composites.

Objective

The weaknesses are arranged in a hierarchical structure in this view (graph), which bears resemblance to the organizational framework utilized by Seven Pernicious Kingdoms.

Relationships

The given graph illustrates the hierarchical connections among weaknesses at different levels of abstraction. At the highest level, weaknesses are grouped into categories and pillars. Categories, which are not technically weaknesses themselves, serve as special CWE entries that group weaknesses based on shared characteristics. Pillars, on the other hand, describe weaknesses in a highly abstract manner. Below these top-level entries, weaknesses exist at various levels of abstraction. Classes, being very abstract, are usually independent of any specific language or technology. Base level weaknesses, on the other hand, provide a more specific type of weakness. Variants are weaknesses described in greater detail, often limited to a specific language or technology. Chains refer to a sequence of weaknesses that must be encountered consecutively to exploit a vulnerability. Conversely, composites are a combination of weaknesses that must all be present simultaneously to exploit a vulnerability.

Is your System Free of Underlying Vulnerabilities?
Find Out Now