Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:SEI CERT Oracle Secure Coding Standard for Java - Guidelines 16. Runtime Environment (ENV)
Category ID:1150
Vulnerability Mapping:Prohibited
Status:Stable
DetailsContent HistoryObserved CVE ExamplesReports
▼Summary

Weaknesses in this category are related to the rules and recommendations in the Runtime Environment (ENV) section of the SEI CERT Oracle Secure Coding Standard for Java.

▼Membership
NatureMappingTypeIDName
MemberOfProhibitedV1133Weaknesses Addressed by the SEI CERT Oracle Coding Standard for Java
HasMemberAllowedB349Acceptance of Extraneous Untrusted Data With Trusted Data
HasMemberAllowed-with-ReviewC732Incorrect Permission Assignment for Critical Resource
Nature: MemberOf
Mapping: Prohibited
Type: View
ID: 1133
Name: Weaknesses Addressed by the SEI CERT Oracle Coding Standard for Java
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 349
Name: Acceptance of Extraneous Untrusted Data With Trusted Data
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 732
Name: Incorrect Permission Assignment for Critical Resource
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:
Rationale:

This entry is a Category. Using categories for mapping has been discouraged since 2019. Categories are informal organizational groupings of weaknesses that can help CWE users with data aggregation, navigation, and browsing. However, they are not weaknesses in themselves.

Comments:

See member weaknesses of this category.

▼Notes
▼Taxonomy Mappings
Taxonomy NameEntry IDFitEntry Name
▼References
Reference ID: REF-829
Title: SEI CERT Oracle Coding Standard for Java : Rule 16. Runtime Environment (ENV)
Version: v4.15
Author: The Software Engineering Institute
Publication:
Publisher:
Edition:
URL:https://wiki.sei.cmu.edu/confluence/pages/viewpage.action?pageId=88487764
URL Date:
Day:N/A
Month:N/A
Year:N/A
Details not found