CWE

Common Weakness Enumeration

A Community-Developed List of Software Weakness Types

CWE/SANS Top 25 Most Dangerous Software Errors
Home > CWE List > CWE- Individual Dictionary Definition (2.11)  
ID

CWE CATEGORY: CERT Java Secure Coding Section 12 - Input Output (FIO)

Category ID: 857
Status: Incomplete
+ Description

Description Summary

Weaknesses in this category are related to rules in the Input Output (FIO) section of the CERT Java Secure Coding Standard. Since not all rules map to specific weaknesses, this category may be incomplete.
+ Relationships
NatureTypeIDNameView(s) this relationship pertains toView(s)
ParentOfWeakness VariantWeakness Variant67Improper Handling of Windows Device Names
Weaknesses Addressed by the CERT Java Secure Coding Standard (primary)844
ParentOfWeakness BaseWeakness Base135Incorrect Calculation of Multi-Byte String Length
Weaknesses Addressed by the CERT Java Secure Coding Standard (primary)844
ParentOfWeakness BaseWeakness Base198Use of Incorrect Byte Ordering
Weaknesses Addressed by the CERT Java Secure Coding Standard (primary)844
ParentOfWeakness VariantWeakness Variant276Incorrect Default Permissions
Weaknesses Addressed by the CERT Java Secure Coding Standard (primary)844
ParentOfWeakness VariantWeakness Variant279Incorrect Execution-Assigned Permissions
Weaknesses Addressed by the CERT Java Secure Coding Standard (primary)844
ParentOfWeakness ClassWeakness Class359Exposure of Private Information ('Privacy Violation')
Weaknesses Addressed by the CERT Java Secure Coding Standard (primary)844
ParentOfWeakness BaseWeakness Base377Insecure Temporary File
Weaknesses Addressed by the CERT Java Secure Coding Standard (primary)844
ParentOfWeakness BaseWeakness Base404Improper Resource Shutdown or Release
Weaknesses Addressed by the CERT Java Secure Coding Standard (primary)844
ParentOfWeakness ClassWeakness Class405Asymmetric Resource Consumption (Amplification)
Weaknesses Addressed by the CERT Java Secure Coding Standard (primary)844
ParentOfWeakness BaseWeakness Base459Incomplete Cleanup
Weaknesses Addressed by the CERT Java Secure Coding Standard (primary)844
ParentOfWeakness VariantWeakness Variant532Information Exposure Through Log Files
Weaknesses Addressed by the CERT Java Secure Coding Standard (primary)844
ParentOfWeakness VariantWeakness Variant533Information Exposure Through Server Log Files
Weaknesses Addressed by the CERT Java Secure Coding Standard (primary)844
ParentOfWeakness VariantWeakness Variant542Information Exposure Through Cleanup Log Files
Weaknesses Addressed by the CERT Java Secure Coding Standard (primary)844
ParentOfWeakness ClassWeakness Class732Incorrect Permission Assignment for Critical Resource
Weaknesses Addressed by the CERT Java Secure Coding Standard844
ParentOfWeakness BaseWeakness Base770Allocation of Resources Without Limits or Throttling
Weaknesses Addressed by the CERT Java Secure Coding Standard844
MemberOfViewView844Weaknesses Addressed by the CERT Java Secure Coding Standard
Weaknesses Addressed by the CERT Java Secure Coding Standard (primary)844
+ Content History
Submissions
Submission DateSubmitterOrganizationSource
2011-05-24Internal CWE Team
Modifications
Modification DateModifierOrganizationSource
2012-05-11CWE Content TeamMITREInternal
updated Relationships

More information is available — Please select a different filter.
Page Last Updated: May 05, 2017