Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:SEI CERT Oracle Secure Coding Standard for Java - Guidelines 06. Methods (MET)
Category ID:1140
Vulnerability Mapping:Prohibited
Status:Stable
DetailsContent HistoryObserved CVE ExamplesReports
▼Summary

Weaknesses in this category are related to the rules and recommendations in the Methods (MET) section of the SEI CERT Oracle Secure Coding Standard for Java.

▼Membership
NatureMappingTypeIDName
MemberOfProhibitedV1133Weaknesses Addressed by the SEI CERT Oracle Coding Standard for Java
HasMemberAllowedV568finalize() Method Without super.finalize()
HasMemberAllowed-with-ReviewC573Improper Following of Specification by Caller
HasMemberAllowedV581Object Model Violation: Just One of Equals and Hashcode Defined
HasMemberAllowedV583finalize() Method Declared Public
HasMemberAllowedB586Explicit Call to Finalize()
HasMemberAllowedV589Call to Non-ubiquitous API
HasMemberAllowedB617Reachable Assertion
HasMemberDiscouragedP697Incorrect Comparison
Nature: MemberOf
Mapping: Prohibited
Type: View
ID: 1133
Name: Weaknesses Addressed by the SEI CERT Oracle Coding Standard for Java
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 568
Name: finalize() Method Without super.finalize()
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 573
Name: Improper Following of Specification by Caller
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 581
Name: Object Model Violation: Just One of Equals and Hashcode Defined
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 583
Name: finalize() Method Declared Public
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 586
Name: Explicit Call to Finalize()
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 589
Name: Call to Non-ubiquitous API
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 617
Name: Reachable Assertion
Nature: HasMember
Mapping: Discouraged
Type: Pillar
ID: 697
Name: Incorrect Comparison
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:
Rationale:

This entry is a Category. Using categories for mapping has been discouraged since 2019. Categories are informal organizational groupings of weaknesses that can help CWE users with data aggregation, navigation, and browsing. However, they are not weaknesses in themselves.

Comments:

See member weaknesses of this category.

▼Notes
▼Taxonomy Mappings
Taxonomy NameEntry IDFitEntry Name
▼References
Reference ID: REF-819
Title: SEI CERT Oracle Coding Standard for Java : Rule 06. Methods (MET)
Version: v4.15
Author: The Software Engineering Institute
Publication:
Publisher:
Edition:
URL:https://wiki.sei.cmu.edu/confluence/pages/viewpage.action?pageId=88487441
URL Date:
Day:N/A
Month:N/A
Year:N/A
Reference ID: REF-1002
Title: SEI CERT Oracle Coding Standard for Java : Rec 06. Methods (MET)
Version: v4.15
Author: The Software Engineering Institute
Publication:
Publisher:
Edition:
URL:https://wiki.sei.cmu.edu/confluence/pages/viewpage.action?pageId=88487336
URL Date:
Day:N/A
Month:N/A
Year:N/A
Details not found