CWE

Common Weakness Enumeration

A Community-Developed List of Software Weakness Types

CWE/SANS Top 25 Most Dangerous Software Errors
Home > CWE List > CWE- Individual Dictionary Definition (2.11)  
ID

CWE CATEGORY: CERT Java Secure Coding Section 49 - Miscellaneous (MSC)

Category ID: 861
Status: Incomplete
+ Description

Description Summary

Weaknesses in this category are related to rules in the Miscellaneous (MSC) section of the CERT Java Secure Coding Standard. Since not all rules map to specific weaknesses, this category may be incomplete.
+ Relationships
NatureTypeIDNameView(s) this relationship pertains toView(s)
ParentOfWeakness BaseWeakness Base259Use of Hard-coded Password
Weaknesses Addressed by the CERT Java Secure Coding Standard (primary)844
ParentOfWeakness BaseWeakness Base311Missing Encryption of Sensitive Data
Weaknesses Addressed by the CERT Java Secure Coding Standard (primary)844
ParentOfWeakness ClassWeakness Class330Use of Insufficiently Random Values
Weaknesses Addressed by the CERT Java Secure Coding Standard (primary)844
ParentOfWeakness VariantWeakness Variant332Insufficient Entropy in PRNG
Weaknesses Addressed by the CERT Java Secure Coding Standard (primary)844
ParentOfWeakness VariantWeakness Variant333Improper Handling of Insufficient Entropy in TRNG
Weaknesses Addressed by the CERT Java Secure Coding Standard (primary)844
ParentOfWeakness BaseWeakness Base336Same Seed in PRNG
Weaknesses Addressed by the CERT Java Secure Coding Standard (primary)844
ParentOfWeakness BaseWeakness Base337Predictable Seed in PRNG
Weaknesses Addressed by the CERT Java Secure Coding Standard (primary)844
ParentOfWeakness BaseWeakness Base400Uncontrolled Resource Consumption ('Resource Exhaustion')
Weaknesses Addressed by the CERT Java Secure Coding Standard844
ParentOfWeakness BaseWeakness Base401Improper Release of Memory Before Removing Last Reference ('Memory Leak')
Weaknesses Addressed by the CERT Java Secure Coding Standard (primary)844
ParentOfWeakness VariantWeakness Variant543Use of Singleton Pattern Without Synchronization in a Multithreaded Context
Weaknesses Addressed by the CERT Java Secure Coding Standard (primary)844
ParentOfWeakness BaseWeakness Base770Allocation of Resources Without Limits or Throttling
Weaknesses Addressed by the CERT Java Secure Coding Standard (primary)844
ParentOfWeakness BaseWeakness Base798Use of Hard-coded Credentials
Weaknesses Addressed by the CERT Java Secure Coding Standard (primary)844
MemberOfViewView844Weaknesses Addressed by the CERT Java Secure Coding Standard
Weaknesses Addressed by the CERT Java Secure Coding Standard (primary)844
+ Content History
Submissions
Submission DateSubmitterOrganizationSource
2011-05-24Internal CWE Team
Modifications
Modification DateModifierOrganizationSource
2012-05-11CWE Content TeamMITREInternal
updated Relationships

More information is available — Please select a different filter.
Page Last Updated: May 05, 2017