Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools


CWE VIEW:Weaknesses Addressed by the CERT C Secure Coding Standard (2008)
ID:734
Vulnerability Mapping:Prohibited
Type:Graph
Status:Obsolete
DetailsContent HistoryObserved CVE ExamplesReports
▼Objective

CWE entries in this view (graph) are fully or partially eliminated by following the guidance presented in the book "The CERT C Secure Coding Standard" published in 2008. This view is considered obsolete, as a newer version of the coding standard is available. This view statically represents the coding rules as they were in 2008.

▼Memberships
NatureMappingTypeIDName
▼Vendors
Note: CVE records are filtered based on below selected vendors.
Not available
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:View
Rationale:

This entry is a View. Views are not weaknesses and therefore inappropriate to describe the root causes of vulnerabilities.

Comments:

Use this View or other Views to search and navigate for the appropriate weakness.

▼Notes
Relationship

The relationships in this view were determined based on specific statements within the rules from the standard. Not all rules have direct relationships to individual weaknesses, although they likely have chaining relationships in specific circumstances.

N/A

▼Audience
StakeholderDescription
Software Developers

By following the CERT C Secure Coding Standard, developers will be able to fully or partially prevent the weaknesses that are identified in this view. In addition, developers can use a CWE coverage graph to determine which weaknesses are not directly addressed by the standard, which will help identify and resolve remaining gaps in training, tool acquisition, or other approaches for reducing weaknesses.

Product Customers

If a software developer claims to be following the CERT C Secure Coding standard, then customers can search for the weaknesses in this view in order to formulate independent evidence of that claim.

Educators

Educators can use this view in multiple ways. For example, if there is a focus on teaching weaknesses, the educator could link them to the relevant Secure Coding Standard.

Stakeholder: Software Developers
Description:

By following the CERT C Secure Coding Standard, developers will be able to fully or partially prevent the weaknesses that are identified in this view. In addition, developers can use a CWE coverage graph to determine which weaknesses are not directly addressed by the standard, which will help identify and resolve remaining gaps in training, tool acquisition, or other approaches for reducing weaknesses.

Stakeholder: Product Customers
Description:

If a software developer claims to be following the CERT C Secure Coding standard, then customers can search for the weaknesses in this view in order to formulate independent evidence of that claim.

Stakeholder: Educators
Description:

Educators can use this view in multiple ways. For example, if there is a focus on teaching weaknesses, the educator could link them to the relevant Secure Coding Standard.

▼References
Reference ID: REF-597
Title: The CERT C Secure Coding Standard
Version: v4.15
Author: Robert C. Seacord
Publication:
Publisher:Addison-Wesley Professional
Edition:1st Edition
URL:
URL Date:
Day:14
Month:10
Year:2008

Expand AllCollapse All

734 - Weaknesses Addressed by the CERT C Secure Coding Standard (2008)
CCERT C Secure Coding Standard (2008) Chapter 2 - Preprocessor (PRE) (735)
CCERT C Secure Coding Standard (2008) Chapter 3 - Declarations and Initialization (DCL) (736)
CCERT C Secure Coding Standard (2008) Chapter 4 - Expressions (EXP) (737)
CCERT C Secure Coding Standard (2008) Chapter 5 - Integers (INT) (738)
CCERT C Secure Coding Standard (2008) Chapter 6 - Floating Point (FLP) (739)
CCERT C Secure Coding Standard (2008) Chapter 7 - Arrays (ARR) (740)
CCERT C Secure Coding Standard (2008) Chapter 8 - Characters and Strings (STR) (741)
CCERT C Secure Coding Standard (2008) Chapter 9 - Memory Management (MEM) (742)
CCERT C Secure Coding Standard (2008) Chapter 10 - Input Output (FIO) (743)
CCERT C Secure Coding Standard (2008) Chapter 11 - Environment (ENV) (744)
CCERT C Secure Coding Standard (2008) Chapter 12 - Signals (SIG) (745)
CCERT C Secure Coding Standard (2008) Chapter 13 - Error Handling (ERR) (746)
CCERT C Secure Coding Standard (2008) Chapter 14 - Miscellaneous (MSC) (747)
CCERT C Secure Coding Standard (2008) Appendix - POSIX (POS) (748)
Details not found