...
Our aim is always to leverage simplicity and usefulness, so finally we decided to base Kiuwan Vulnerability Types upon Wheeler & Moorthy’s paper.
Ref: “State-of-the-Art Resources (SOAR) for Software Vulnerability Detection, Test, and Evaluation” paper (http://www.acq.osd.mil/se/docs/P-5061-software-soar-mobility-Final-Full-Doc-20140716.pdfState-of-the-Art Resources (SOAR) for Software Vulnerability Detection, Test, and Evaluation) and related works (NSA Center for Assured Software, 2012 and 2011, https://samate.nist.gov/docs/CAS%202012%20Static%20Analysis%20Tool%20Study%20Methodology.pdf and https://samate.nist.gov/docs/CAS_2011_SA_Tool_Method.pdf, respectively NSA-2012 and NSA-2011).
Based on that (we added our 2 cents, of course), Kiuwan considers following Vulnerability Types:
...