Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:CERT C++ Secure Coding Section 11 - Signals (SIG)
Category ID:879
Vulnerability Mapping:Prohibited
Status:Incomplete
DetailsContent HistoryObserved CVE ExamplesReports
▼Summary

Weaknesses in this category are related to rules in the Signals (SIG) section of the CERT C++ Secure Coding Standard. Since not all rules map to specific weaknesses, this category may be incomplete.

▼Membership
NatureMappingTypeIDName
MemberOfProhibitedV868Weaknesses Addressed by the SEI CERT C++ Coding Standard (2016 Version)
HasMemberAllowedV479Signal Handler Use of a Non-reentrant Function
HasMemberDiscouragedC662Improper Synchronization
Nature: MemberOf
Mapping: Prohibited
Type: View
ID: 868
Name: Weaknesses Addressed by the SEI CERT C++ Coding Standard (2016 Version)
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 479
Name: Signal Handler Use of a Non-reentrant Function
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 662
Name: Improper Synchronization
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:
Rationale:

This entry is a Category. Using categories for mapping has been discouraged since 2019. Categories are informal organizational groupings of weaknesses that can help CWE users with data aggregation, navigation, and browsing. However, they are not weaknesses in themselves.

Comments:

See member weaknesses of this category.

▼Notes
▼Taxonomy Mappings
Taxonomy NameEntry IDFitEntry Name
▼References
Reference ID: REF-858
Title: 11. Signals (SIG)
Version: v4.15
Author: CERT
Publication:
Publisher:
Edition:
URL:https://www.securecoding.cert.org/confluence/display/cplusplus/11.+Signals+%28SIG%29
URL Date:
Day:N/A
Month:N/A
Year:N/A
Details not found