NOTICE: As of 4/16/2024, the CWE Compatibility Program has been discontinued. The product listings included in this section have been moved to "archive" status.
MOVING FORWARD: Please follow these CWE Compatibility Requirements to consider your product or service "CWE Compatible."
The products and services listed below have achieved the final stage of the CWE Compatibility Program and are now "Officially CWE-Compatible." The organization's completed "CWE Compatibility Requirements Evaluation" questionnaires are posted here and on the Organizations Participating page as part of their product listings.
Products are listed alphabetically by organization name:
| AbsInt Angewandte Informatik GmbH | Date Declared: Aug 18, 2018 |
|---|
Web Site:
Quote/Declaration: Astrée is a sound static analyzer capable of proving the absence of runtime errors and other programming defects in C code as well as verifying the code's compliance to coding guidelines. We are pleased to support the efforts of MITRE by adding CWE as a coding guideline that can be automatically checked and verified by Astrée.
| AdaCore | Date Declared: Aug 20, 2015 |
|---|
Web Site:
Quote/Declaration: AdaCore has decades of experience providing tools and services to customers in industries with the most demanding requirements for software safety, security and reliability. AdaCore technologies, such as SPARK Pro and CodePeer generate verifiable evidence that the job is done right, beyond the usual "tested it lots". The Ada programming language has always placed an emphasis on software quality and security by its very design. Our approach takes that further, with the most advanced compilers and verification tools on the market. Through the Ada language and AdaCore tools, a number of the most dangerous SANS Top 25 CWE can be detected and corrected early in the software development cycle before they become active vulnerabilities.
| Ambionics Security | Date Declared: May 17, 2017 |
|---|
Web Site:
| Anban Information Technology Co., Ltd | Date Declared: April 30, 2024 |
|---|
Web Site:
| Anhui USTC-Guochuang High-Confidence Software Co.,Ltd | Date Declared: September 6, 2022 |
|---|
Web Site:
| Beijing Anpro Information Technology Co. LTD | Date Declared: September 30, 2020 |
|---|
Web Site:
| Beijing Beida Software Engineering Development Co., Ltd. | Date Declared: November 11, 2015 |
|---|
Web Site:
Quote/Declaration: COBOT focuses on detecting more and more bugs with high accuracy. The foundation of designing a good static analysis tool is defect patterns. Therefore COBOT is pleased to support the efforts of MITRE to establish the CWE standard by ensuring CWE Compatibility for the development of our product.
| Beijing Moyunsec Technology Co.,Ltd | Date Declared: February 28, 2022 |
|---|
Web Site:
| Beijing RedRocket Technology Co., Ltd | Date Declared: September 22, 2021 |
|---|
Web Site:
Quote/Declaration: CWE is a famous general security vulnerability dictionary in the field of security. "CWE compatibility" is one of the important symbols of software security products. We hope to make our own contribution in the field of code security. In addition, if we successfully apply for CWE compatibility and effectiveness, our products will be favored by more users.
| Beijing Vulinsight Technology Co., Ltd | Date Declared: March 18, 2024 |
|---|
Web Site:
| Beijing ZHONGKE TIANQI Information Technology Co.,Ltd. | Date Declared: October 9, 2021 |
|---|
Web Site:
| CAST | Date Declared: September 17, 2009 |
|---|
Web Site:
Quote/Declaration: CAST's mission for 18 years has been to enable IT organizations to manage non-functional software risk, quality and measurement issues for better business outcomes. CAST has always believed in an industry-led, standards-based approach to ensure proper coverage. Along with ISO, SEI and de facto quality & measurement standards, CAST views CWE as an important new contribution to the canon that can be brought to bear on business issues.
| Checkmarx | Date Declared: March 19, 2008 |
|---|
Web Site:
Quote/Declaration: Checkmarx is an enthusiastic supporter of CWE standards and best practices. The combination of Checkmarx new generation Static Analysis Security Testing technology for all major coding languages including mobile (Android/iOS) and localization to various languages, together with CWE's industry leading standards, provides the programming community a more secure and vulnerability free environment. Exposing CWE's standards to our rapidly growing customer base, both in the U.S. and the rest of the world, has proven to be effective in identifying vulnerabilities and contributing to a more secure cyber world.
| CodeForce(Beijing)Software Technology Co., Ltd | Date Declared: February 21, 2022 |
|---|
Web Site:
| Conviso Application Security | Date Declared: April 12, 2013 |
|---|
Web Site:
Quote/Declaration: Because just finding bugs isn't enough!
| Cr0security | Date Declared: December 11, 2013 |
|---|
Web Site:
Quote/Declaration: Cr0security focuses on software application security and professional security services and supports the CWE standard.
| CXSecurity | Date Declared: January 3, 2012 |
|---|
Web Site:
| Cybellum | Date Declared: June 18, 2023 |
|---|
Web Site:
Quote/Declaration: Empowering security for a hyper-connected world, we proactively manage cyber risk and compliance from design to operational use, keeping our products and customers secure today and into the future.
| David A. Wheeler | Date Declared: Jul 25, 2014 |
|---|
Web Site:
| Denim Group, Ltd | Date Declared: March 12, 2013 |
|---|
Web Site:
Quote/Declaration: ThreadFix is a software vulnerability aggregation and management solution that imports results from static, dynamic, and manual software security testing tools, providing a centralized view of defects across development projects. CWE is an important and valuable initiative that will help ThreadFix users better understand the security posture of their code.
| DerSecur Ltd. | Date Declared: June 7, 2022 |
|---|
Web Site:
Quote/Declaration: DerSecur provides system integration, software development and cybersecurity solutions & services by focusing on client’s current needs and long-term strategy. DerSecur has a team of professionals, located in offices around the world. Our long-term partner relationships with industry leaders cover B2B solutions and IT infrastructure.
| Evenstar | Date Declared: January 15, 2016 |
|---|
Web Site:
Quote/Declaration: Our company offers the most up-to-date information on security and secure coding to customers, The CWE list of standardized software vulnerabilities is to be consulted when developing software for providing security and quality enhancement.
| GrammaTech, Inc. | Date Declared: March 13, 2007 |
|---|
Web Site:
Quote/Declaration: GrammaTech's CodeSonar is a static analysis tool for finding programming flaws and security vulnerabilities in C/C++ code. CWE is an important and valuable initiative that will help CodeSonar users understand the state of their code more effectively. GrammaTech is pleased to participate in this effort.
| GTONE Co., Ltd. | Date Declared: Aug 20, 2015 |
|---|
Web Site:
| GYSecurity Technology Co., Ltd | Date Declared: January 11, 2024 |
|---|
Web Site:
| Hangzhou Huawei Cloud Computing Technologies Co., Ltd | Date Declared: August 23, 2022 |
|---|
| High-Tech Bridge SA | Date Declared: August 20, 2012 |
|---|
Web Site:
Quote/Declaration: At High-Tech Bridge we strongly believe that CWE information security standard makes security measurable and universal, from which customers, vendors and security researchers benefit. We are grateful to the efforts of MITRE Corporation for continuous CWE standard development and support.
| IBM Security Systems | Date Declared: July 10, 2012 |
|---|
Web Site:
Quote/Declaration: IBM actively promotes, supports, and contributes to the emerging open systems standards such as CVE that enable technology management software in the IBM Security portfolio of intrusion detection, vulnerability assessment, end point management, and security management components to inter-operate and share management information. We know that open system standards are a critical step in this direction. We support CVE as the first and the most complete naming convention for vulnerability mapping in the industry and we are committed to using CVE within our product in a tightly integrated fashion.
| Imagix Corporation | Date Declared: Jun 12, 2018 |
|---|
Web Site:
Quote/Declaration: Through use of Imagix 4D's source and dataflow analysis and visualization, the Imagix CWE Checklist specifically identifies and assesses over 200 CWE weaknesses. Particular focus is on weaknesses that can't be easily resolved through static analysis alone. This guided code review supports C and C++, generating an audit trail and supporting repeated reviews across software revisions.
| IriusRisk | Date Declared: July 31, 2020 |
|---|
Web Site:
Quote/Declaration: Iriusrisk is a threat modeling tool with architectural diagramming capabilities and an adaptive questionnaire driven by an expert system which guides the user through straight forward questions about the technical architecture, the planned features and security context of the application. The questionnaire modifies itself in real-time based on the supplied answers. As it learns more about the architecture, it asks more specific questions in order to accurately identify the inherent risks. This questionnaire is 100% editable through our graphical rules editor, so that you can customise the questions to your environment and common architectures.
| Julia S.R.L. |
|---|
Web Site:
Quote/Declaration: Julia is a sound semantic static analyzer of Java bytecode. We consider CWE standard as the lingua franca to communicate what capabilities our tool offers, to measure what it covers, and to compare our results with the ones of our competitors.
| Kiuwan Software S.L | Date Declared: February 17, 2017 |
|---|
Web Site:
Quote/Declaration: Enterprise Software Analytics platform. Based on static code analysis, Kiuwan gathers evidence from application source code to exploit them in a cloud (SaaS) platform at all levels to drive ALM decisions based on objective information. Application security is a key aspect to measure and control to avoid associated risk. Kiuwan provides not only high level indicators of application security, but all the detailed information of the found vulnerabilities with a clear mapping to CWE weaknesses, so stakeholders in the application development life cycle can take the appropriate action to mitigate vulnerabilities and associated risk.
| Klocwork, Inc. | Date Declared: February 05, 2007 |
|---|
Web Site:
Quote/Declaration: We see CWE as an important collaboration between academia, government, and industry to help mainstream the principles of secure coding. Klocwork is pleased to contribute to this initiative and have made our source code analysis tools compliant with the second level of the CWE Compatibility Program.
| LDRA | Date Declared: September 16, 2009 |
|---|
Web Site:
Quote/Declaration: LDRA has been a valuable contributor to the software security industry and its standardization process. The next step in this endeavor is establishing CWE compatibility and effectiveness as a top priority for the LDRA Tool Suite.
| Lucent Sky Corporation | Date Declared: November 30, 2015 |
|---|
Web Site:
| MathWorks, Inc. | Date Declared: January 15, 2014 |
|---|
Web Site:
Quote/Declaration: MathWorks has a long commitment to help its users creating more reliable software. The MITRE initiative to establish a classification of software weaknesses is in line with our support of developing reliable and high quality software. We are pleased to support the CWE Compatibility Program with our Polyspace code verification products.
| Micro Focus Fortify | Date Declared: February 05, 2007 |
|---|
Quote/Declaration: Micro Focus Fortify recognizes the importance of establishing industry standard terminology and classification with regard to weaknesses in software and is pleased to support the efforts of MITRE to establish the CWE standard by ensuring CWE compatibility for all Micro Focus Application Security Center products and services.
| Naive Systems Ltd. | Date Declared: November 8, 2023 |
|---|
Web Site:
| National Institute of Standards and Technology (NIST) | Date Declared: March 2, 2012 |
|---|
Web Site:
Quote/Declaration: The purpose of the Software Assurance Reference Dataset (SARD) is to provide a public repository of test cases to measure the accuracy and breadth of software assurance tools; to improve tools and techniques; and to increase adoption and use of software tools, higher quality software. The CWE compatibility and effectiveness will enhance the usability of SRD among software assurance tools and users.
| Oversecured Inc | Date Declared: September 23, 2020 |
|---|
Web Site:
Quote/Declaration: A static SaaS-based vulnerability scanner for Android apps (APK files), supports apps written on Java and Kotlin. Allows integrations into DevOps processes. Contains 90+ vulnerability categories.
| Parasoft Corporation | Date Declared: September 14, 2009 |
|---|
Web Site:
Quote/Declaration: Parasoft enables development teams to build security into their applications by facilitating code-hardening practices based on accepted industry standards.
| Programming Research, Inc. | Date Declared: September 17, 2009 |
|---|
Web Site:
Quote/Declaration: PRQA is the leader in automated coding standards enforcement and defect prevention in C and C++ source code. Our support of CWE enhances our ability to close security vulnerabilities. We are committed to the safety and security of our client's source pools by supporting CWE on an ongoing basis.
| QI-ANXIN Technology Group Inc. | Date Declared: December 29, 2022 |
|---|
Web Site:
| Red Hat, Inc. | Date Declared: February 8, 2012 |
|---|
Web Site:
Quote/Declaration: Red Hat is engaged in CWE Compatibility for providing a common language for discussing, identifying, and dealing with the causes of vulnerabilities in its products as part of its assessment services, knowledge repositories, software development practices, and education offerings.
| School of Software, Tsinghua University | Date Declared: Jun 12, 2018 |
|---|
Web Site:
| Security Reviewer | Date Declared: September 22, 2021 |
|---|
Web Site:
Quote/Declaration: To ensure accurate risk severity, Security Reviewer Suite correlates the results from across its multiple analyzers (SAST, DAST, IAST, Software Composition Analysis and Firmware Analysis). This provides an accurate picture of your Application's security and ensures development is addressing the most significant issues first.
| Security-Database | Date Declared: May 5, 2008 |
|---|
Web Site:
Quote/Declaration: CWE is great effort to empower organizations to better identify and eliminate programming flaws. Security-Database is pleased to support this initiative by supplying CWE information along with vulnerability information. We are also planning to ensure CWE compatibility with our next vulnerability management software.
| SecZone | Date Declared: January 27, 2022 |
|---|
Web Site:
| Shanghai Feiyu Technology Co.,Ltd. | Date Declared: August 12, 2022 |
|---|
Web Site:
| Shenzhen Secidea Network Security Technology Co., Ltd | Date Declared: January 13, 2022 |
|---|
Web Site:
Quote/Declaration: Secidea is an application security company that focuses on making tools and platforms to help developers procedure high quality software. Making our products compatible with CWE standard provides great benefits to the users of our products.
| Soft4Soft Co., Ltd. | Date Declared: January 3, 2016 |
|---|
Web Site:
| Software Security | Date Declared: March 16, 2023 |
|---|
Web Site:
Quote/Declaration: SoftSec SCA is an open source software governance tool that provides open source software asset identification (SBOM), security risk analysis, license compliance detection, vulnerability alerts and open source software security management by leveraging multiple detection technologies, an autonomous controllable analysis engine and a powerful security gene library to help enterprises continuously reduce security, compliance and operational risks associated with open source software, and help enterprises build a secure software supply chain system.
| SonarSource SA | Date Declared: Aug 20, 2015 |
|---|
Web Site:
Quote/Declaration: The SonarQube platform is an open source, multi-language, extensible tool for Continuous Inspection of code quality. In combination with the Java plugin, it offers full-featured code quality management for Java code. In combination with the C/C++ plugin, it offers full-featured code quality management for C and C++ code. In combination with the Objective-C plugin, it offers full-featured code quality management for Objective-C code.
| Sparrow Co., Ltd. | Date Declared: August 8, 2012 |
|---|
Web Site:
Quote/Declaration: SPARROW is a source code analysis tool that has both semantic and syntactic analysis engines. SPARROW detects runtime errors, security vulnerabilities, and coding convention violations in various programming languages (C/C++/Java/JSP/Android Java). SparrowFasoo.com is pleased to support the efforts of MITRE to establish the CWE standard by ensuring CWE Compatibility for our product.
| Suresoft Technologies Inc. | Date Declared: November 17, 2015 |
|---|
Web Site:
| Suzhou Lengjingqicai Information Technology Co.,Ltd | Date Declared: September 6, 2022 |
|---|
Web Site:
| Synopsys Inc. | Date Declared: September 10, 2009 |
|---|
Quote/Declaration: Synopsys helps organizations build high-quality, secure software faster.
| ToolsWatch | Date Declared: Aug 20 2015 |
|---|
Web Site:
Quote/Declaration: ToolsWatch provides vFeed a fully aggregated, cross-linked and standardized Vulnerability Database based on CVE and industry standards such as CWE, OVAL, CAPEC, CPE, CVSS etc. So we strongly believe the importance of the standardization efforts driven by MITRE. Therefore, vFeed will definitely continue to support the CWE initiative and is pleased to ensure the CWE Compatibility for its vFeed Vulnerability Database Community and all derived products and services.
| TRINITYSOFT Co., Ltd | Date Declared: March 26, 2024 |
|---|
Web Site:
| ValiantSec Technology Co.,Ltd | Date Declared: April 7, 2022 |
|---|
Web Site:
| Vector Informatik GmbH | Date Declared: July 18, 2023 |
|---|
Web Site:
Quote/Declaration: We are in the process of adding support for CWE to the next release (2.1) of our product (PC-lint Plus) which we anticipate being available by the end of 2023.
| Veracode, Inc. | Date Declared: February 05, 2007 |
|---|
Web Site:
Quote/Declaration: We are pursuing CWE Compatibility because we believe in standards-based testing. It benefits the customer community and advances progress in application security when vendors adopt an industry standard. Doing so allows a common yardstick for measurement regardless of the product or service used and allows true comparisons and a common understanding of the problems affecting software applications.
| WebLayers, Inc. | Date Declared: May 3, 2012 |
|---|
Web Site:
Quote/Declaration: WebLayers Center Java Security Library consists of policies that map to the CWE standard and best practices. The policies provide a complete set of security specific coding guidelines targeted at the Java programming language.
Use of the Common Weakness Enumeration (CWE™) and the associated references from this website are subject to the Terms of Use. CWE is sponsored by the U.S. Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) and managed by the Homeland Security Systems Engineering and Development Institute (HSSEDI) which is operated by The MITRE Corporation (MITRE). Copyright © 2006–2025, The MITRE Corporation. CWE, CWSS, CWRAF, and the CWE logo are trademarks of The MITRE Corporation.