Mapping Vulnerability Data in Benchmarks and Rules of  Tools to CWE