Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:The CERT Oracle Secure Coding Standard for Java (2011) Chapter 7 - Methods (MET)
Category ID:850
Vulnerability Mapping:Prohibited
Status:Obsolete
DetailsContent HistoryObserved CVE ExamplesReports
▼Summary

Weaknesses in this category are related to rules in the Methods (MET) chapter of The CERT Oracle Secure Coding Standard for Java (2011).

▼Membership
NatureMappingTypeIDName
MemberOfProhibitedV844Weaknesses Addressed by The CERT Oracle Secure Coding Standard for Java (2011)
HasMemberAllowedB487Reliance on Package-level Scope
HasMemberAllowedV568finalize() Method Without super.finalize()
HasMemberAllowed-with-ReviewC573Improper Following of Specification by Caller
HasMemberAllowedV581Object Model Violation: Just One of Equals and Hashcode Defined
HasMemberAllowedV583finalize() Method Declared Public
HasMemberAllowedB586Explicit Call to Finalize()
HasMemberAllowedV589Call to Non-ubiquitous API
HasMemberAllowedB617Reachable Assertion
Nature: MemberOf
Mapping: Prohibited
Type: View
ID: 844
Name: Weaknesses Addressed by The CERT Oracle Secure Coding Standard for Java (2011)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 487
Name: Reliance on Package-level Scope
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 568
Name: finalize() Method Without super.finalize()
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 573
Name: Improper Following of Specification by Caller
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 581
Name: Object Model Violation: Just One of Equals and Hashcode Defined
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 583
Name: finalize() Method Declared Public
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 586
Name: Explicit Call to Finalize()
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 589
Name: Call to Non-ubiquitous API
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 617
Name: Reachable Assertion
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:
Rationale:

This entry is a Category. Using categories for mapping has been discouraged since 2019. Categories are informal organizational groupings of weaknesses that can help CWE users with data aggregation, navigation, and browsing. However, they are not weaknesses in themselves.

Comments:

See member weaknesses of this category.

▼Notes
▼Taxonomy Mappings
Taxonomy NameEntry IDFitEntry Name
▼References
Reference ID: REF-813
Title: The CERT Oracle Coding Standard for Java
Version: v4.15
Author: Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda
Publication:
Publisher:Addison-Wesley Professional
Edition:1st Edition
URL:
URL Date:
Day:18
Month:09
Year:2011
Details not found