Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:CERT C++ Secure Coding Section 12 - Exceptions and Error Handling (ERR)
Category ID:880
Vulnerability Mapping:Prohibited
Status:Incomplete
DetailsContent HistoryObserved CVE ExamplesReports
▼Summary

Weaknesses in this category are related to rules in the Exceptions and Error Handling (ERR) section of the CERT C++ Secure Coding Standard. Since not all rules map to specific weaknesses, this category may be incomplete.

▼Membership
NatureMappingTypeIDName
MemberOfProhibitedV868Weaknesses Addressed by the SEI CERT C++ Coding Standard (2016 Version)
HasMemberAllowedB209Generation of Error Message Containing Sensitive Information
HasMemberAllowedB390Detection of Error Condition Without Action
HasMemberProhibitedB391Unchecked Error Condition
HasMemberAllowedB544Missing Standardized Error Handling Mechanism
HasMemberAllowedB460Improper Cleanup on Thrown Exception
HasMemberAllowedB497Exposure of Sensitive System Information to an Unauthorized Control Sphere
HasMemberDiscouragedP703Improper Check or Handling of Exceptional Conditions
HasMemberAllowed-with-ReviewC705Incorrect Control Flow Scoping
HasMemberAllowed-with-ReviewC754Improper Check for Unusual or Exceptional Conditions
HasMemberDiscouragedC755Improper Handling of Exceptional Conditions
Nature: MemberOf
Mapping: Prohibited
Type: View
ID: 868
Name: Weaknesses Addressed by the SEI CERT C++ Coding Standard (2016 Version)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 209
Name: Generation of Error Message Containing Sensitive Information
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 390
Name: Detection of Error Condition Without Action
Nature: HasMember
Mapping: Prohibited
Type: Base
ID: 391
Name: Unchecked Error Condition
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 544
Name: Missing Standardized Error Handling Mechanism
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 460
Name: Improper Cleanup on Thrown Exception
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 497
Name: Exposure of Sensitive System Information to an Unauthorized Control Sphere
Nature: HasMember
Mapping: Discouraged
Type: Pillar
ID: 703
Name: Improper Check or Handling of Exceptional Conditions
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 705
Name: Incorrect Control Flow Scoping
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 754
Name: Improper Check for Unusual or Exceptional Conditions
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 755
Name: Improper Handling of Exceptional Conditions
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:
Rationale:

This entry is a Category. Using categories for mapping has been discouraged since 2019. Categories are informal organizational groupings of weaknesses that can help CWE users with data aggregation, navigation, and browsing. However, they are not weaknesses in themselves.

Comments:

See member weaknesses of this category.

▼Notes
▼Taxonomy Mappings
Taxonomy NameEntry IDFitEntry Name
▼References
Reference ID: REF-861
Title: 12. Exceptions and Error Handling (ERR)
Version: v4.15
Author: CERT
Publication:
Publisher:
Edition:
URL:https://www.securecoding.cert.org/confluence/display/cplusplus/12.+Exceptions+and+Error+Handling+%28ERR%29
URL Date:
Day:N/A
Month:N/A
Year:N/A
Details not found