A community-developed list of SW & HW weaknesses that can become vulnerabilities
Includes previous release versions of the core content downloads, schemas, schema documentation, and difference reports.