Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:The CERT Oracle Secure Coding Standard for Java (2011) Chapter 14 - Input Output (FIO)
Category ID:857
Vulnerability Mapping:Prohibited
Status:Obsolete
DetailsContent HistoryObserved CVE ExamplesReports
▼Summary

Weaknesses in this category are related to rules in the Input Output (FIO) chapter of The CERT Oracle Secure Coding Standard for Java (2011).

▼Membership
NatureMappingTypeIDName
MemberOfProhibitedV844Weaknesses Addressed by The CERT Oracle Secure Coding Standard for Java (2011)
HasMemberAllowedB135Incorrect Calculation of Multi-Byte String Length
HasMemberAllowedV198Use of Incorrect Byte Ordering
HasMemberAllowedB276Incorrect Default Permissions
HasMemberAllowedV279Incorrect Execution-Assigned Permissions
HasMemberAllowedB359Exposure of Private Personal Information to an Unauthorized Actor
HasMemberAllowed-with-ReviewC377Insecure Temporary File
HasMemberAllowed-with-ReviewC404Improper Resource Shutdown or Release
HasMemberAllowed-with-ReviewC405Asymmetric Resource Consumption (Amplification)
HasMemberAllowedB459Incomplete Cleanup
HasMemberAllowedB532Insertion of Sensitive Information into Log File
HasMemberAllowedV67Improper Handling of Windows Device Names
HasMemberAllowed-with-ReviewC732Incorrect Permission Assignment for Critical Resource
HasMemberAllowedB770Allocation of Resources Without Limits or Throttling
Nature: MemberOf
Mapping: Prohibited
Type: View
ID: 844
Name: Weaknesses Addressed by The CERT Oracle Secure Coding Standard for Java (2011)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 135
Name: Incorrect Calculation of Multi-Byte String Length
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 198
Name: Use of Incorrect Byte Ordering
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 276
Name: Incorrect Default Permissions
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 279
Name: Incorrect Execution-Assigned Permissions
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 359
Name: Exposure of Private Personal Information to an Unauthorized Actor
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 377
Name: Insecure Temporary File
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 404
Name: Improper Resource Shutdown or Release
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 405
Name: Asymmetric Resource Consumption (Amplification)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 459
Name: Incomplete Cleanup
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 532
Name: Insertion of Sensitive Information into Log File
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 67
Name: Improper Handling of Windows Device Names
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 732
Name: Incorrect Permission Assignment for Critical Resource
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 770
Name: Allocation of Resources Without Limits or Throttling
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:
Rationale:

This entry is a Category. Using categories for mapping has been discouraged since 2019. Categories are informal organizational groupings of weaknesses that can help CWE users with data aggregation, navigation, and browsing. However, they are not weaknesses in themselves.

Comments:

See member weaknesses of this category.

▼Notes
▼Taxonomy Mappings
Taxonomy NameEntry IDFitEntry Name
▼References
Reference ID: REF-813
Title: The CERT Oracle Coding Standard for Java
Version: v4.15
Author: Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda
Publication:
Publisher:Addison-Wesley Professional
Edition:1st Edition
URL:
URL Date:
Day:18
Month:09
Year:2011
Details not found