CWE

Common Weakness Enumeration

A Community-Developed List of Software & Hardware Weakness Types

CWE Top 25 Most Dangerous Software Errors
Home > CWE List > CWE- Individual Dictionary Definition (4.1)  
ID

CWE CATEGORY: SEI CERT Oracle Secure Coding Standard for Java - Guidelines 16. Runtime Environment (ENV)

Category ID: 1150
Status: Stable
+ Summary
Weaknesses in this category are related to the rules and recommendations in the Runtime Environment (ENV) section of the SEI CERT Oracle Secure Coding Standard for Java.
+ Membership
NatureTypeIDName
MemberOfViewView - a subset of CWE entries that provides a way of examining CWE content. The two main view structures are Slices (flat lists) and Graphs (containing relationships between entries).1133Weaknesses Addressed by the SEI CERT Oracle Coding Standard for Java
HasMemberBaseBase - a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource.349Acceptance of Extraneous Untrusted Data With Trusted Data
HasMemberClassClass - a weakness that is described in a very abstract fashion, typically independent of any specific language or technology. More specific than a Pillar Weakness, but more general than a Base Weakness. Class level weaknesses typically describe issues in terms of 1 or 2 of the following dimensions: behavior, property, and resource.732Incorrect Permission Assignment for Critical Resource
+ References
[REF-829] The Software Engineering Institute. "SEI CERT Oracle Coding Standard for Java : Rule 16. Runtime Environment (ENV)". <https://wiki.sei.cmu.edu/confluence/pages/viewpage.action?pageId=88487764>.
+ Content History
+ Submissions
Submission DateSubmitterOrganization
2018-12-11CWE Content TeamMITRE
More information is available — Please select a different filter.
Page Last Updated: June 25, 2020