diff --git a/objects/cve.json b/objects/cve.json index d1336a771..8130237b7 100644 --- a/objects/cve.json +++ b/objects/cve.json @@ -8,9 +8,13 @@ "requirement": "recommended" }, "cwe_uid": { + "caption": "CWE ID", + "description": "The Common Weakness Enumeration (CWE) is a community-developed list of software and hardware weakness types. The CWE Specification provides a common language of discourse for discussing, finding and dealing with the causes of software security vulnerabilities as they are found in code, design, or system architecture. For more information see CWE.", "requirement": "optional" }, "cwe_url": { + "caption": "CWE URL", + "description": "URL to the CWE Specification. For more information see CWE.", "requirement": "optional" }, "modified_time": { diff --git a/objects/cwe.json b/objects/cwe.json new file mode 100644 index 000000000..840793d2e --- /dev/null +++ b/objects/cwe.json @@ -0,0 +1,18 @@ +{ + "caption": "CWE", + "description": "The CWE object represents a weakness in a software system that can be exploited by a threat actor to perform an attack. The CWE object is based on the Common Weakness Enumeration (CWE) catalog.", + "extends": "object", + "name": "cwe", + "attributes": { + "uid": { + "caption": "CWE ID", + "description": "The Common Weakness Enumeration unique number assigned to a specific weakness. A CWE Identifier begins \"CWE\" followed by a sequence of digits that acts as a unique identifier. For example: CWE-123.", + "requirement": "required" + }, + "cwe_url": { + "caption": "CWE URL", + "description": "The URL to the CWE entry in the Common Weakness Enumeration (CWE) list.", + "requirement": "optional" + } + } +} diff --git a/objects/vulnerability.json b/objects/vulnerability.json index dcf8761fa..154167fc4 100644 --- a/objects/vulnerability.json +++ b/objects/vulnerability.json @@ -5,7 +5,10 @@ "extends": "object", "attributes": { "cve": { - "requirement": "required" + "requirement": "recommended" + }, + "cwe": { + "requirement": "recommended" }, "desc": { "description": "The description of the vulnerability.",