Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools


CWE VIEW:Weaknesses Addressed by The CERT Oracle Secure Coding Standard for Java (2011)
ID:844
Vulnerability Mapping:Prohibited
Type:Graph
Status:Obsolete
DetailsContent HistoryObserved CVE ExamplesReports
▼Objective

CWE entries in this view (graph) are fully or partially eliminated by following the guidance presented in the book "The CERT Oracle Secure Coding Standard for Java" published in 2011. This view is considered obsolete as a newer version of the coding standard is available.

▼Memberships
NatureMappingTypeIDName
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:View
Rationale:

This entry is a View. Views are not weaknesses and therefore inappropriate to describe the root causes of vulnerabilities.

Comments:

Use this View or other Views to search and navigate for the appropriate weakness.

▼Notes
Relationship

The relationships in this view were determined based on specific statements within the rules from the standard. Not all rules have direct relationships to individual weaknesses, although they likely have chaining relationships in specific circumstances.

N/A

▼Audience
StakeholderDescription
Software Developers

By following The CERT Oracle Secure Coding Standard for Java, developers will be able to fully or partially prevent the weaknesses that are identified in this view. In addition, developers can use a CWE coverage graph to determine which weaknesses are not directly addressed by the standard, which will help identify and resolve remaining gaps in training, tool acquisition, or other approaches for reducing weaknesses.

Product Customers

If a software developer claims to be following The CERT Oracle Secure Coding Standard for Java, then customers can search for the weaknesses in this view in order to formulate independent evidence of that claim.

Educators

Educators can use this view in multiple ways. For example, if there is a focus on teaching weaknesses, the educator could link them to the relevant Secure Coding Standard.

Stakeholder: Software Developers
Description:

By following The CERT Oracle Secure Coding Standard for Java, developers will be able to fully or partially prevent the weaknesses that are identified in this view. In addition, developers can use a CWE coverage graph to determine which weaknesses are not directly addressed by the standard, which will help identify and resolve remaining gaps in training, tool acquisition, or other approaches for reducing weaknesses.

Stakeholder: Product Customers
Description:

If a software developer claims to be following The CERT Oracle Secure Coding Standard for Java, then customers can search for the weaknesses in this view in order to formulate independent evidence of that claim.

Stakeholder: Educators
Description:

Educators can use this view in multiple ways. For example, if there is a focus on teaching weaknesses, the educator could link them to the relevant Secure Coding Standard.

▼References
Reference ID: REF-813
Title: The CERT Oracle Coding Standard for Java
Version: v4.15
Author: Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda
Publication:
Publisher:Addison-Wesley Professional
Edition:1st Edition
URL:
URL Date:
Day:18
Month:09
Year:2011

Expand AllCollapse All

844 - Weaknesses Addressed by The CERT Oracle Secure Coding Standard for Java (2011)
CThe CERT Oracle Secure Coding Standard for Java (2011) Chapter 15 - Serialization (SER) (858)
CThe CERT Oracle Secure Coding Standard for Java (2011) Chapter 16 - Platform Security (SEC) (859)
CThe CERT Oracle Secure Coding Standard for Java (2011) Chapter 2 - Input Validation and Data Sanitization (IDS) (845)
CThe CERT Oracle Secure Coding Standard for Java (2011) Chapter 3 - Declarations and Initialization (DCL) (846)
CThe CERT Oracle Secure Coding Standard for Java (2011) Chapter 4 - Expressions (EXP) (847)
CThe CERT Oracle Secure Coding Standard for Java (2011) Chapter 5 - Numeric Types and Operations (NUM) (848)
CThe CERT Oracle Secure Coding Standard for Java (2011) Chapter 6 - Object Orientation (OBJ) (849)
CThe CERT Oracle Secure Coding Standard for Java (2011) Chapter 7 - Methods (MET) (850)
CThe CERT Oracle Secure Coding Standard for Java (2011) Chapter 8 - Exceptional Behavior (ERR) (851)
CThe CERT Oracle Secure Coding Standard for Java (2011) Chapter 13 - Thread-Safety Miscellaneous (TSM) (856)
CThe CERT Oracle Secure Coding Standard for Java (2011) Chapter 9 - Visibility and Atomicity (VNA) (852)
CThe CERT Oracle Secure Coding Standard for Java (2011) Chapter 10 - Locking (LCK) (853)
CThe CERT Oracle Secure Coding Standard for Java (2011) Chapter 11 - Thread APIs (THI) (854)
CThe CERT Oracle Secure Coding Standard for Java (2011) Chapter 12 - Thread Pools (TPS) (855)
CThe CERT Oracle Secure Coding Standard for Java (2011) Chapter 14 - Input Output (FIO) (857)
CThe CERT Oracle Secure Coding Standard for Java (2011) Chapter 17 - Runtime Environment (ENV) (860)
CThe CERT Oracle Secure Coding Standard for Java (2011) Chapter 18 - Miscellaneous (MSC) (861)
Details not found